Learn how to use Kali Linux for advanced penetration testing, including stealthy testing, privilege escalation, tunneling and exfiltration, and pivoting.
Overview
Syllabus
Introduction
- Using Kali Linux as the basis for advanced penetration testing
- What you should know
- Disclaimer
- Testing with Kali Linux
- Understanding Kali deployments
- Preparing your toolbox
- Preparing to use exploits for testing
- Managing the Kali menu
- Using the LinkedIn Learning penetration testing lab
- Introduction to shells
- Exploring Kali webshells
- Weeving a shell
- Generating shellcode with msfvenom
- Injecting images with jhead
- Using shellcode in exploits
- Exploiting systems with Kali
- Exploiting with Python
- Exploiting with Perl
- Exploiting with C
- Exploiting with CPP
- Obtaining Windows passwords
- Obtaining Linux passwords
- Targeting Metasploitable
- Exploiting VSFTPD
- Exploiting with ProFTPD
- Exploiting Tomcat
- Exploiting IRC
- Exploiting the distributed compile system
- Exploiting network files
- Hiding in plain sight
- Escalating to root
- Starting with online labs
- Exploiting rejetto
- Exploiting the Devel
- Time to exploit Cronos
- Cronos revisited: Getting to the root
- Using a nightmare escalator
- Next steps
Taught by
Malcolm Shore