->
Oreilly - Mastering Kali Linux - 9781789345766
Oreilly - Mastering Kali Linux
by Paul Olushile | Publisher: Packt Publishing | Release Date: August 2018 | ISBN: 9781789345766


Discover techniques used by hackers to exploit your servers, Bluetooth devices, WordPress, network security flaws & moreAbout This VideoDiscover the vast features and programs that Kali Linux offers in order to perform and carry out a variety of penetration testing purposesExplore easy ways to scan single IP addresses, or a range of IP addresses, complete with ports, hosts, and even security holesBecome proficient at performing network penetration tests and learn to exploit vulnerable systemsIn DetailBecome a master at any hackers game by discovering and understanding each of the major tools that every hacker is currently using.You will discover proper techniques to hack into any WordPress websites to test for vulnerabilities and weaknesses. Then dive deep into website and server scanning as well as network scanning and testing for any open security breaches. In addition, you will get introduced to bluetooth hacking for any open bluetooth enabled devices near you. Finally, explore the ultimate Social Engineering Toolkit embedded inside of your Kali machine.By the end of this course, you will have mastered Kali Linux in order to be the most efficient ethical hacker to carry out proper penetration testing upon your target, as well as discovering how to increase your own networks security.
  1. Chapter 1 : Advanced Reconnaissance!
    • The Course Overview 00:05:53
    • Performing the Right Recon Work 00:05:08
    • Installing Recon-NG 00:08:33
    • Integrating Twitter API’s 00:04:20
    • Discovering Modules with Recon-NG 00:03:46
    • Exploiting Modules with Recon-NG 00:04:57
  2. Chapter 2 : Exploiting WordPress Sites
    • Scanning WordPress Sites 00:04:41
    • Enumerating Usernames 00:04:12
    • Cultivating a Password Dictionary 00:05:27
    • Bruteforcing Login 00:04:37
    • Discovering Plugins and More! 00:04:52
  3. Chapter 3 : Finding Vulnerabilities with SQLMap
    • SQL Databases 00:03:28
    • Google Dorking 00:04:56
    • Site Vulnerability Testing 00:02:49
    • Listing Databases and Tables with SQLMap 00:02:25
    • Listing Usernames from Tables 00:02:25
    • Extracting Passwords from Target Columns 00:02:29
    • Cracking Passwords 00:03:43
  4. Chapter 4 : Hacking Bluetooth Devices
    • Bluetooth Tools 00:02:11
    • Scan and Ping for Victims 00:02:58
    • RFComm Channel Surfing 00:02:04
    • RedFang 00:04:23
    • Other Tools 00:03:47
  5. Chapter 5 : Advanced Scanning Methods
    • Port Scanning 00:04:05
    • Zombie 00:02:21
    • Nikto Scanning 00:06:20
    • Perform a Stealth Scan 00:03:31
  6. Chapter 6 : Target Exploiting and Testing
    • Exploring the S.E.T. 00:01:55
    • Site Cloning 00:02:32
    • Spear Fishing 00:05:20
    • Harvester Attacking 00:02:20
    • Exploiting with Commix 00:03:35
  7. Chapter 7 : Scanning and Testing Networks
    • Scanning for Live Hosts 00:04:16
    • Discovering Open Ports 00:02:18
    • Find Services Actively Listening 00:04:27
    • Show Anonymous FTP Logins 00:03:28
    • Test for Vulnerabilities 00:06:36
  8. Oreilly - Mastering Kali Linux


 TO MAC USERS: If RAR password doesn't work, use this archive program: 

RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


 TO WIN USERS: If RAR password doesn't work, use this archive program: 

Latest Winrar  and extract password protected files without error.


 Coktum   |  

Information
Members of Guests cannot leave comments.




rss