Course Outline
Introduction
- Overview of Kali Linux
- Installing and configuring Kali Linux
- Using and updating Kali Linux
Kali Linux Files Directories and Permissions
- Customizing workspace and panel
- Creating directories and files
- Finding and locating files and directories
- Commands and man page
- Linux files permissions and hidden files
- Managing and killing the Linux process
Advanced Commands
- HTOP and ATOP extended commands
- Searching lines head-and-tails-wc-history
- Persistent aliases and real-world cases
- Command-line web downloader
- Scripting in bash shell
- Sorting results using grep and cut
Pre-engagement and Information Gathering
- Rules of engagement
- Standards of penetration testing execution
- DNS and route analysis
- Network and port scanning
- SMB and OSINT analysis
Vulnerability Scanning and Analysis
- Web application vulnerability scanning
- CMS and framework identification
- Force browsing DIRs and files using ZAP
- Web crawling and directory listing
- Vulnerability analysis using Nmap NSE and Nikto
- Vulnerability analysis using legion and Unix-privesc-check
- Firewall and IDS evasion with Nmap
Exploitation
- Exploiting SQL injection
- Blind SQL injection attack in-action
- Outdated web application to server takeout
Reporting
- Penetration testing reports
- Engagement details
Summary and Next Steps
Requirements
- Basic understanding of ethical hacking
- Basic knowledge of Kali Linux penetration testing
Audience
- Ethical hackers
- Penetration testers
- Security engineers
- IT professionals
Testimonials
The coolest thing was that it was not the "dry" knowledge, there were only a lot of exercises and repetitions on a regular basis, and that all the questions asked during the training were answered by the instructor, which definitely facilitated the understanding of the issue.
Julia Minicka
The way of conducting classes
Szymon Wolny
interesting issues, nice facilitator, professional way of conducting classes
Małgorzata Konior
The most striking thing for me was the trainer's use of talking to the group in the way "Look", "Look", "Now use this command" - this is a fairly well-known and effective method of maintaining focus among listeners. In addition, extensive knowledge of the teacher. which he can convey in an accessible way.
Motorola Solutions Systems Polska Sp. z o.o
The trainer has a lot of substantive knowledge and communicates well with the audience.
Motorola Solutions Systems Polska Sp. z o.o
The flexibility of the trainer
Dawid Rowinski - IBM Global Services Delivery Centre Polska Sp. z o.o.
I mostly liked the explanation of fundamentals.
Desi Cozier - National Defence / Government of Canada
-
- Deloitte Digital Sp. z o.o.
The great place left to the exercises
- ONEM
the trainer was able to adapt his course in relation to our needs
Pascal Houyoux - ONEM
The number of exercises
Jos Couder - ONEM
interractivité
- ONEM
many exercises
Jean-Paul Labaisse - ONEM
Very good training, dynamic and interactive
Agostino Candela - ONEM
A good refresher of my historical knowledge
- ONEM
availability of the trainer. The explanations are clear.
mostafa el oueriaghli - ONEM
the exercises
rudi bernaer - ONEM
The extra informations not in the official docs
Sayf Eddine HAMMEMI - SCALITY SA
Go tooling
- SCALITY SA
The many practical exercises
Delphine Agnello - ONEM
Adapting the content of workshops to the needs of students, striving to address the issue, ability to communicate information
- Powiat Lubański
Covered Linux basics which was very helpful to understand the rest of the course Good pace and good communication
Richard Copley - Egress Software Technologies
Executing commands myself and learning what some of the Linux 'code' actually means.
Paul Tosseano - Egress Software Technologies
Engaging exercises, perfect pace
Hannah Clough - Egress Software Technologies
Many positives. I came to the training to get a better understanding of Unix and I certainly can go back to work with a lot more knowledge which was my main goal.
Ben Frijters - Argenta Spaarbank NV
Delivery and Lab
Egress Software Technologies
There were lots of exercises, which was really good.
James Eyre - Egress Software Technologies
There were alsways some information on the side, which is usually left (in other courses) out but nonetheless important and interesting.
Sopra Steria
The personal approach and the practical way of going trough the seen theory afterwards.