Kali Linux Penetration Testing Bible

Pursue your dream of becoming a skilled professional in penetration testing with NetworkCerts Kali Linux Penetration Testing Course. This course is specifically designed for defensive specialists, red teamers and ethical hackers. With interactive lessons and hand-on labs candidate receive comprehensive knowledge of digital forensics, reverse engineering, gain expertise in Kali Linux tools, and master pen-testing techniques. Enhance your skills in the cybersecurity enterprises by learning identification of vulnerabilities and automate testing.

 

Lessons

21+ Lessons | 55+ Exercises | 122+ Flashcards | 122+ Glossary of terms

Hand on lab

32+ Live Lab | 32+ Video tutorials | 59+ Minutes

Benefits

“The Kali Linux Penetration Testing Bible” is not a specific book or publication I have information on in my training data up to September 2021. However, I can provide general insights into the potential benefits of a book or resource that focuses on Kali Linux and penetration testing:

Hands-On Learning: A book dedicated to Kali Linux penetration testing likely provides practical, hands-on exercises and examples. This can help readers gain real-world experience in ethical hacking and penetration testing.

Skill Development: It can help individuals develop valuable cybersecurity skills, such as network scanning, vulnerability assessment, exploitation, and ethical hacking techniques.

Certification Preparation: Many individuals use resources like this to prepare for industry-recognized certifications like CompTIA Security+, Certified Ethical Hacker (CEH), or Offensive Security Certified Professional (OSCP).

Understanding Kali Linux: Kali Linux is a popular distribution for penetration testing and ethical hacking. A resource focusing on it can help readers understand its tools, capabilities, and how to use them effectively.

Security Awareness: It can raise awareness about cybersecurity threats and vulnerabilities, making individuals more knowledgeable about protecting their own systems and networks.

Career Advancement: Gaining expertise in penetration testing can open up career opportunities in the field of cybersecurity, as organizations are constantly looking for professionals who can identify and address security weaknesses.

Contributing to Cybersecurity: By learning how to identify vulnerabilities and secure systems, individuals can contribute to the broader goal of improving cybersecurity and protecting sensitive data.

Networking: Reading such a resource may introduce individuals to a community of like-minded professionals interested in ethical hacking and penetration testing. Networking within this community can be valuable for sharing knowledge and experiences.

Continoues Learning: Cybersecurity is an ever-evolving field, and books and resources like this can encourage continuous learning and staying updated with the latest threats and security practices.

Practical Application: The book may provide readers with real-world scenarios and challenges, allowing them to apply what they’ve learned in a practical context.

Reviews

Excellent course. Easy to follow and understand.
Steve S.
My first Networkcerts course and so far, I am really enjoying it and look forward to doing more. Great first impression!
Justin H.

Here's what you will learn

1
Course Outline

Lessons 1: Introduction

  • What Does This Course Cover?

Lessons 2: Mastering the Terminal Window

  • Kali Linux File System
  • Managing Users and Groups in Kali
  • Files and Folders Management in Kali Linux
  • Remote Connections in Kali
  • Kali Linux System Management
  • Networking in Kali Linux
  • Summary

Lessons 3: Bash Scripting

  • Basic Bash Scripting
  • Printing to the Screen in Bash
  • Variables
  • Script Parameters
  • User Input
  • Functions
  • Conditions and Loops
  • Summary

Lessons 4: Network Hosts Scanning

  • Basics of Networking
  • Network Scanning
  • DNS Enumeration
  • Summary

Lessons 5: Internet Information Gathering

  • Passive Footprinting and Reconnaissance
  • Summary

Lessons 6: Social Engineering Attacks

  • Spear Phishing Attacks
  • Payloads and Listeners
  • Social Engineering with the USB Rubber Ducky
  • Summary

Lessons 7: Advanced Enumeration Phase

  • Transfer Protocols
  • E‐mail Protocols
  • Database Protocols
  • CI/CD Protocols
  • Web Protocols 80/443
  • Graphical Remoting Protocols
  • File Sharing Protocols
  • Summary

Lessons 8: Exploitation Phase

  • Vulnerabilities Assessment
  • Services Exploitation
  • Summary

Lessons 9: Web Application Vulnerabilities

  • Web Application Vulnerabilities
  • Summary

Lessons 10: Web Penetration Testing and Secure Software Development Lifecycle

  • Web Enumeration and Exploitation
  • Secure Software Development Lifecycle
  • Summary

Lessons 11: Linux Privilege Escalation

  • Introduction to Kernel Exploits and Missing Configurations
  • Kernel Exploits
  • SUID Exploitation
  • Overriding the Passwd Users File
  • CRON Jobs Privilege Escalation
  • sudoers
  • Exploiting Running Services
  • Automated Scripts
  • Summary

Lessons 12: Windows Privilege Escalation

  • Windows System Enumeration
  • File Transfers
  • Windows System Exploitation
  • Summary

Lessons 13: Pivoting and Lateral Movement

  • Dumping Windows Hashes
  • Pivoting with Port Redirection
  • Summary

Lessons 14: Cryptography and Hash Cracking

  • Basics of Cryptography
  • Cracking Secrets with Hashcat
  • Summary

Lessons 15: Reporting

  • Overview of Reports in Penetration Testing
  • Scoring Severities
  • Report Presentation
  • Summary

Lessons 16: Assembly Language and Reverse Engineering

  • CPU Registers
  • Assembly Instructions
  • Data Types
  • Memory Segments
  • Addressing Modes
  • Reverse Engineering Example
  • Summary

Lessons 17: Buffer/Stack Overflow

  • Basics of Stack Overflow
  • Stack Overflow Exploitation
  • Summary

Lessons 18: Programming with Python

  • Basics of Python
  • Running Python Scripts
  • Debugging Python Scripts
  • Practicing Python
  • Python Basic Syntaxes
  • Variables
  • More Techniques in Python
  • Summary

Lessons 19: Pentest Automation with Python

  • Penetration Test Robot
  • Summary

Lessons 20: APPENDIX A: Kali Linux Desktop at a Glance

  • Downloading and Running a VM of Kali Linux
  • Kali Xfce Desktop
  • Summary

Lessons 21: APPENDIX B: Building a Lab Environment Using Docker

  • Docker Technology
  • Summary
2
Hands-on LAB Activities

Mastering the Terminal Window

  • Managing Users Using Users Commands
  • Changing the Permissions of a File Using the chmod Command

Network Hosts Scanning

  • Performing Port Scanning and Identifying Live Hosts
  • Performing Zone Transfer Using dig

Internet Information Gathering

  • Using Maltego
  • Using Google Hacking Database (GHDB)
  • Using Shodan to Find Webcams
  • Using the Information Gathering Tool

Social Engineering Attacks

  • Gathering Information Using the Social Engineering Toolkit
  • Analyzing Malware Using VirusTotal
  • Creating Reverse and Bind Shells Using Netcat

Advanced Enumeration Phase

  • Performing Session Hijacking Using Burpsuite

Exploitation Phase

  • Performing Vulnerability Scanning Using OpenVAS
  • Searching Exploits Using searchsploit
  • Securing the FTP Service
  • Using the msfvenom Program

Web Application Vulnerabilities

  • Exploiting Local File Inclusion and Remote File Inclusion Vulnerabilities
  • Conducting Cross-Site Request Forgery Attacks
  • Exploiting Command Injection Vulnerabilities
  • Exploiting a Website Using SQL Injection
  • Attacking a Website Using XSS Injection

Linux Privilege Escalation

  • Creating a Shell Script and cron Job

Windows Privilege Escalation

  • Using Basic Enumeration Commands
  • Displaying Networking Information
  • Using Meterpreter to Display the System Information

Pivoting and Lateral Movement

  • Using Mimikatz
  • Cracking Passwords Using Cain and Abel

Cryptography and Hash Cracking

  • Performing Symmetric Encryption
  • Examining Asymmetric Encryption
  • Observing an SHA256-Generated Hash Value
  • Observing an MD5-Generated Hash Value

Pentest Automation with Python

  • Finding Live Hosts by Using the Ping Sweep in Python

Be the first to add a review.

Please, login to leave a review
Get course
Enrolled: 0 students
Lectures: 2
Level: Intermediate

Office Hours

Monday 9:00 am - 6.00 pm
Tuesday 9:00 am - 6.00 pm
Wednesday 9:00 am - 6.00 pm
Thursday 9:00 am - 6.00 pm
Friday 9:00 am - 6.00 pm
Saturday 10:00 am - 6.00 pm
Sunday 10:00 am - 6.00 pm