Overview
Explore the world of penetration testing and cybersecurity with this conference talk from BSides Nashville 2015. Learn about Kali Linux, a powerful open-source platform for security auditing and penetration testing. Discover how to set up and use Kali, configure Metasploit, and identify common vulnerabilities in systems. Gain insights into finding "low hanging fruit" in cybersecurity, including unnecessary services, weak passwords, exploitable vulnerabilities, and web-based admin interfaces. Perfect for both beginners and experienced professionals looking to enhance their security assessment skills.
Syllabus
Intro
Who Am I?
What is Kali?
How to Get Kali
Setup Kali
Setup Metasploit
A Quick Look at Kali
Low Hanging Fruit
Unnecessary Services
Weak Passwords
Exploitable Vulnerabilities
Web-Based Admin Interfaces
Find out More