Course Code: kalilinuxpentestint
Duration: 14 hours
Prerequisites:
  • Basic understanding of ethical hacking
  • Basic knowledge of Kali Linux penetration testing

Audience

  • Ethical hackers
  • Penetration testers
  • Security engineers
  • IT professionals
Overview:

Kali Linux is a Linux distribution created for digital forensics and penetration testing. Penetration testing with Kali Linux provides an advanced platform for ethical hacking, security analysis, bug bounty hunt, and much more.

This instructor-led, live training (online or onsite) is aimed at IT professionals who wish to learn more about performing penetration testing and other security management with Kali Linux.

By the end of this training, participants will be able to:

  • Understand the internals of Kali Linux.
  • Perform vulnerability scan and analysis.
  • Manage file permissions and directories structure.
  • Work with commands and shortcuts in hacker style.

Format of the Course

  • Interactive lecture and discussion.
  • Lots of exercises and practice.
  • Hands-on implementation in a live-lab environment.

Course Customization Options

  • To request a customized training for this course, please contact us to arrange.
Course Outline:

Introduction

  • Overview of Kali Linux
  • Installing and configuring Kali Linux
  • Using and updating Kali Linux

Kali Linux Files Directories and Permissions

  • Customizing workspace and panel
  • Creating directories and files
  • Finding and locating files and directories
  • Commands and man page
  • Linux files permissions and hidden files
  • Managing and killing the Linux process

Advanced Commands

  • HTOP and ATOP extended commands
  • Searching lines head-and-tails-wc-history
  • Persistent aliases and real-world cases
  • Command-line web downloader
  • Scripting in bash shell
  • Sorting results using grep and cut

Pre-engagement and Information Gathering

  • Rules of engagement
  • Standards of penetration testing execution
  • DNS and route analysis
  • Network and port scanning
  • SMB and OSINT analysis

Vulnerability Scanning and Analysis

  • Web application vulnerability scanning
  • CMS and framework identification
  • Force browsing DIRs and files using ZAP
  • Web crawling and directory listing
  • Vulnerability analysis using Nmap NSE and Nikto
  • Vulnerability analysis using legion and Unix-privesc-check
  • Firewall and IDS evasion with Nmap

Exploitation

  • Exploiting SQL injection
  • Blind SQL injection attack in-action
  • Outdated web application to server takeout

Reporting

  • Penetration testing reports
  • Engagement details

Summary and Next Steps

Sites Published:

United Arab Emirates - Kali Linux Penetration Testing (Intermediary)

Qatar - Kali Linux Penetration Testing (Intermediary)

Egypt - Kali Linux Penetration Testing (Intermediary)

Saudi Arabia - Kali Linux Penetration Testing (Intermediary)

South Africa - Kali Linux Penetration Testing (Intermediary)

Brasil - Kali Linux Penetration Testing (Intermediary)

Canada - Kali Linux Penetration Testing (Intermediary)

中国 - Kali Linux Penetration Testing (Intermediary)

香港 - Kali Linux Penetration Testing (Intermediary)

澳門 - Kali Linux Penetration Testing (Intermediary)

台灣 - Kali Linux Penetration Testing (Intermediary)

USA - Kali Linux Penetration Testing (Intermediary)

Österreich - Kali Linux Penetration Testing (Intermediary)

Schweiz - Kali Linux Penetration Testing (Intermediary)

Deutschland - Kali Linux Penetration Testing (Intermediary)

Czech Republic - Kali Linux Penetration Testing (Intermediary)

Denmark - Kali Linux Penetration Testing (Intermediary)

Estonia - Kali Linux Penetration Testing (Intermediary)

Finland - Kali Linux Penetration Testing (Intermediary)

Greece - Kali Linux Penetration Testing (Intermediary)

Magyarország - Kali Linux Penetration Testing (Intermediary)

Ireland - Kali Linux Penetration Testing (Intermediary)

Luxembourg - Kali Linux Penetration Testing (Intermediary)

Latvia - Kali Linux Penetration Testing (Intermediary)

España - Kali Linux Penetration Testing (Intermediary)

Italia - Kali Linux Penetration Testing (Intermediary)

Lithuania - Kali Linux Penetration Testing (Intermediary)

Nederland - Kali Linux Penetration Testing (Intermediary)

Norway - Kali Linux Penetration Testing (Intermediary)

Portugal - Kali Linux Penetration Testing (Intermediary)

România - Kali Linux Penetration Testing (Intermediary)

Sverige - Kali Linux Penetration Testing (Intermediary)

Türkiye - Kali Linux Penetration Testing (Intermediary)

Malta - Kali Linux Penetration Testing (Intermediary)

Belgique - Kali Linux Penetration Testing (Intermediary)

France - Kali Linux Penetration Testing (Intermediary)

日本 - Kali Linux Penetration Testing (Intermediary)

Australia - Kali Linux Penetration Testing (Intermediary)

Malaysia - Kali Linux Penetration Testing (Intermediary)

New Zealand - Kali Linux Penetration Testing (Intermediary)

Philippines - Kali Linux Penetration Testing (Intermediary)

Singapore - Kali Linux Penetration Testing (Intermediary)

Thailand - Kali Linux Penetration Testing (Intermediary)

Vietnam - Kali Linux Penetration Testing (Intermediary)

India - Kali Linux Penetration Testing (Intermediary)

Argentina - Kali Linux Penetration Testing (Intermediary)

Chile - Kali Linux Penetration Testing (Intermediary)

Costa Rica - Kali Linux Penetration Testing (Intermediary)

Ecuador - Kali Linux Penetration Testing (Intermediary)

Guatemala - Kali Linux Penetration Testing (Intermediary)

Colombia - Kali Linux Penetration Testing (Intermediary)

México - Kali Linux Penetration Testing (Intermediary)

Panama - Kali Linux Penetration Testing (Intermediary)

Peru - Kali Linux Penetration Testing (Intermediary)

Uruguay - Kali Linux Penetration Testing (Intermediary)

Venezuela - Kali Linux Penetration Testing (Intermediary)

Polska - Kali Linux Penetration Testing (Intermediary)

United Kingdom - Kali Linux Penetration Testing (Intermediary)

South Korea - Kali Linux Penetration Testing (Intermediary)

Pakistan - Kali Linux Penetration Testing (Intermediary)

Sri Lanka - Kali Linux Penetration Testing (Intermediary)

Bulgaria - Kali Linux Penetration Testing (Intermediary)

Bolivia - Kali Linux Penetration Testing (Intermediary)

Indonesia - Kali Linux Penetration Testing (Intermediary)

Kazakhstan - Kali Linux Penetration Testing (Intermediary)

Moldova - Kali Linux Penetration Testing (Intermediary)

Morocco - Kali Linux Penetration Testing (Intermediary)

Tunisia - Kali Linux Penetration Testing (Intermediary)

Kuwait - Kali Linux Penetration Testing (Intermediary)

Oman - Kali Linux Penetration Testing (Intermediary)

Slovakia - Kali Linux Penetration Testing (Intermediary)

Kenya - Kali Linux Penetration Testing (Intermediary)

Nigeria - Kali Linux Penetration Testing (Intermediary)

Botswana - Kali Linux Penetration Testing (Intermediary)

Slovenia - Kali Linux Penetration Testing (Intermediary)

Croatia - Kali Linux Penetration Testing (Intermediary)

Serbia - Kali Linux Penetration Testing (Intermediary)

Bhutan - Kali Linux Penetration Testing (Intermediary)

Nepal - Kali Linux Penetration Testing (Intermediary)

Uzbekistan - Kali Linux Penetration Testing (Intermediary)