
Learning Network Penetration Testing with Kali Linux
Tilgjengelig for kjøp
Episoder
S1 E1 - The Course Overview
23. april 20174minThis video provides an overview of the entire course.Tilgjengelig for kjøpS1 E2 - Introducing Kali Linux
23. april 20175minThis video aims to introduce you to Kali Linux.Tilgjengelig for kjøpS1 E3 - Getting Familiar with Hardware Requirements and Recommendations
23. april 20174minThis video discusses the required hardware and software that will allow us to install and run Kali Linux.Tilgjengelig for kjøpS1 E4 - Installing Kali Linux in VirtualBox
23. april 201714minInstalling Kali Linux in a virtual environment.Tilgjengelig for kjøpS1 E5 - Installing Kali Linux on Raspberry Pi
23. april 201713minThis video shows how to install Kali Linux on a Raspberry Pi device.Tilgjengelig for kjøpS1 E6 - Introducing Kali Linux Interface and Tools
23. april 20178minThis video gives a brief introduction to the Kali Linux interface and tools.Tilgjengelig for kjøpS1 E7 - Updating Kali Linux
23. april 20176minKeeping Kali Linux up to date.Tilgjengelig for kjøpS1 E8 - Networking Fundamentals
23. april 201713minSome of the networking fundamentals and terms that we are going to use throughout this course.Tilgjengelig for kjøpS1 E9 - Creating a Pen-Testing Lab Environment
23. april 20179minWhy is it important to have a pen-testing lab environment?Tilgjengelig for kjøpS1 E10 - What Is Penetration Testing?
23. april 20175minIn this video, we will discuss what penetration testing is and why you might want to learn it.Tilgjengelig for kjøpS1 E11 - Reconnaissance
23. april 20178minThis video represents a short introduction to the first phase of pen-testing-reconnaissance.Tilgjengelig for kjøpS1 E12 - Getting Familiar with Vulnerability Scanning
23. april 20173minWhat is vulnerability scanning?Tilgjengelig for kjøpS1 E13 - Gaining and Maintaining Access
23. april 20174minThird phase of pen-testing-gaining and maintaining access.Tilgjengelig for kjøpS1 E14 - Covering Tracks
23. april 20172minLast phase of a hacking attack-covering tracks.Tilgjengelig for kjøpS1 E15 - Gathering Initial Information
23. april 20176minObtain passive information about our target.Tilgjengelig for kjøpS1 E16 - Identifying Live Hosts
23. april 201711minIt's time to perform some active reconnaissance.Tilgjengelig for kjøpS1 E17 - Discovering Open Ports
23. april 201710minUsing Kali Linux tools, we try to discover the open ports available in our target machine.Tilgjengelig for kjøpS1 E18 - Uncovering Services and Fingerprinting the OS
23. april 20178minDiscover the services that are running on our target machine and its operating system.Tilgjengelig for kjøpS1 E19 - Vulnerability Scanning with OpenVAS
23. april 201711minDiscovering vulnerabilities in our target system using the OpenVAS vulnerability scanner.Tilgjengelig for kjøpS1 E20 - Vulnerability Scanning with Nessus
23. april 201711minDiscover the services that are vulnerable on our target system using the Nessus scanner.Tilgjengelig for kjøpS1 E21 - Exploiting the Target System
23. april 201715minTime to exploit the vulnerabilities found on our target system.Tilgjengelig for kjøpS1 E22 - Cracking the System Passwords
23. april 20177minWe copied the system passwords from the target machine to our Kali Linux machine. Now it's time to crack those passwords.Tilgjengelig for kjøpS1 E23 - Post Exploitation
23. april 20174minDiscussion about the post-exploitation phase.Tilgjengelig for kjøpS1 E24 - Defensive CounterMeasures
23. april 20175minWhat can a system administrator do against these hacking attacks?Tilgjengelig for kjøp