Kali Linux Penetration Testing Bible
(KALI-LINUX.AE1) / ISBN : 978-1-64459-423-0
About This Course
Become an expert in penetration testing with the course Kali Linux Penetration Testing Bible. Designed for red teamers, ethical hackers, and defensive specialists, this course offers interactive lessons, quizzes, and hands-on labs to enhance your skills. Explore the powerful tools of Kali Linux, master pentesting techniques, and gain expertise in digital forensics and reverse engineering. Stay ahead in the field of cybersecurity by learning how to identify vulnerabilities and automate testing.
Skills You’ll Get
Get the support you need. Enroll in our Instructor-Led Course.
Interactive Lessons
21+ Interactive Lessons | 55+ Exercises | 122+ Flashcards | 122+ Glossary of terms
Gamified TestPrep
Hands-On Labs
32+ LiveLab | 32+ Video tutorials | 59+ Minutes
Introduction
- What Does This Course Cover?
Mastering the Terminal Window
- Kali Linux File System
- Managing Users and Groups in Kali
- Files and Folders Management in Kali Linux
- Remote Connections in Kali
- Kali Linux System Management
- Networking in Kali Linux
- Summary
Bash Scripting
- Basic Bash Scripting
- Printing to the Screen in Bash
- Variables
- Script Parameters
- User Input
- Functions
- Conditions and Loops
- Summary
Network Hosts Scanning
- Basics of Networking
- Network Scanning
- DNS Enumeration
- Summary
Internet Information Gathering
- Passive Footprinting and Reconnaissance
- Summary
Social Engineering Attacks
- Spear Phishing Attacks
- Payloads and Listeners
- Social Engineering with the USB Rubber Ducky
- Summary
Advanced Enumeration Phase
- Transfer Protocols
- E‐mail Protocols
- Database Protocols
- CI/CD Protocols
- Web Protocols 80/443
- Graphical Remoting Protocols
- File Sharing Protocols
- Summary
Exploitation Phase
- Vulnerabilities Assessment
- Services Exploitation
- Summary
Web Application Vulnerabilities
- Web Application Vulnerabilities
- Summary
Web Penetration Testing and Secure Software Development Lifecycle
- Web Enumeration and Exploitation
- Secure Software Development Lifecycle
- Summary
Linux Privilege Escalation
- Introduction to Kernel Exploits and Missing Configurations
- Kernel Exploits
- SUID Exploitation
- Overriding the Passwd Users File
- CRON Jobs Privilege Escalation
- sudoers
- Exploiting Running Services
- Automated Scripts
- Summary
Windows Privilege Escalation
- Windows System Enumeration
- File Transfers
- Windows System Exploitation
- Summary
Pivoting and Lateral Movement
- Dumping Windows Hashes
- Pivoting with Port Redirection
- Summary
Cryptography and Hash Cracking
- Basics of Cryptography
- Cracking Secrets with Hashcat
- Summary
Reporting
- Overview of Reports in Penetration Testing
- Scoring Severities
- Report Presentation
- Summary
Assembly Language and Reverse Engineering
- CPU Registers
- Assembly Instructions
- Data Types
- Memory Segments
- Addressing Modes
- Reverse Engineering Example
- Summary
Buffer/Stack Overflow
- Basics of Stack Overflow
- Stack Overflow Exploitation
- Summary
Programming with Python
- Basics of Python
- Running Python Scripts
- Debugging Python Scripts
- Practicing Python
- Python Basic Syntaxes
- Variables
- More Techniques in Python
- Summary
Pentest Automation with Python
- Penetration Test Robot
- Summary
APPENDIX A: Kali Linux Desktop at a Glance
- Downloading and Running a VM of Kali Linux
- Kali Xfce Desktop
- Summary
APPENDIX B: Building a Lab Environment Using Docker
- Docker Technology
- Summary
Mastering the Terminal Window
- Managing Users Using Users Commands
- Changing the Permissions of a File Using the chmod Command
Network Hosts Scanning
- Performing Port Scanning and Identifying Live Hosts
- Performing Zone Transfer Using dig
Internet Information Gathering
- Using Maltego
- Using Google Hacking Database (GHDB)
- Using Shodan to Find Webcams
- Using the Information Gathering Tool
Social Engineering Attacks
- Gathering Information Using the Social Engineering Toolkit
- Analyzing Malware Using VirusTotal
- Creating Reverse and Bind Shells Using Netcat
Advanced Enumeration Phase
- Performing Session Hijacking Using Burpsuite
Exploitation Phase
- Performing Vulnerability Scanning Using OpenVAS
- Searching Exploits Using searchsploit
- Securing the FTP Service
- Using the msfvenom Program
Web Application Vulnerabilities
- Exploiting Local File Inclusion and Remote File Inclusion Vulnerabilities
- Conducting Cross-Site Request Forgery Attacks
- Exploiting Command Injection Vulnerabilities
- Exploiting a Website Using SQL Injection
- Attacking a Website Using XSS Injection
Linux Privilege Escalation
- Creating a Shell Script and cron Job
Windows Privilege Escalation
- Using Basic Enumeration Commands
- Displaying Networking Information
- Using Meterpreter to Display the System Information
Pivoting and Lateral Movement
- Using Mimikatz
- Cracking Passwords Using Cain and Abel
Cryptography and Hash Cracking
- Performing Symmetric Encryption
- Examining Asymmetric Encryption
- Observing a SHA256-Generated Hash Value
- Observing an MD5-Generated Hash Value
Pentest Automation with Python
- Finding Live Hosts by Using the Ping Sweep in Python