Get in Touch

Course Outline

Introduction

  • Overview of Kali Linux
  • Installing and configuring Kali Linux
  • Using and updating Kali Linux

Kali Linux Files, Directories, and Permissions

  • Customizing workspace and panel
  • Creating directories and files
  • Locating files and directories
  • Commands and manual pages
  • Linux file permissions and hidden files
  • Managing and terminating Linux processes

Advanced Commands

  • Extended HTOP and ATOP commands
  • Searching lines using head, tail, wc, and history
  • Persistent aliases and real-world examples
  • Command-line web downloaders
  • Bash shell scripting
  • Sorting results using grep and cut

Pre-engagement and Information Gathering

  • Rules of engagement
  • Standards for penetration testing execution
  • DNS and route analysis
  • Network and port scanning
  • SMB and OSINT analysis

Vulnerability Scanning and Analysis

  • Web application vulnerability scanning
  • CMS and framework identification
  • Force browsing directories and files using ZAP
  • Web crawling and directory listing
  • Vulnerability analysis using Nmap NSE and Nikto
  • Vulnerability analysis using Legion and Unix-privesc-check
  • Firewall and IDS evasion with Nmap

Exploitation

  • Exploiting SQL injection
  • Executing blind SQL injection attacks
  • Compromising outdated web applications and servers

Reporting

  • Penetration testing reports
  • Engagement details

Summary and Next Steps

Requirements

  • Foundational understanding of ethical hacking
  • Basic knowledge of Kali Linux penetration testing

Audience

  • Ethical hackers
  • Penetration testers
  • Security engineers
  • IT professionals
 14 Hours

Number of participants


Price per participant

Upcoming Courses

Related Categories