Kali linux Complete Hacking Operating System

Learn tools and Softwares of Kali linux Hacking O.S.

0 (0 ratings) 2 students enrolled

Instructed by SUNIL GUPTA

This Cyber Security Training will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems.

 

  1.   THIS COURSE IS FULLY PRACTICAL COURSE

          Students will also learn about kali linux tools. When a student leaves this intensive class they will have hands on understanding and experience in Ethical Hacking and Security in Offensive Way .

                                                                                                                                           Sunil K. Gupta 

                                                                                                                                    Cyber Security Specialist

  • Basic Knowledge of PC
  • Baisc Knowledge of Linux
  • You will Learn Most Imp. Tools in Kali linux
  • Gain Confidence to run Kali linux
  • Students who want to learn about Hacking Operating System
  • Students who want to enhance their knowledge in the field of Hacking
Total Time : 04:32:20

Section 1 : Kali linux Installation

  • Lecture 1 :
  • Installation of Kali linux Operating System
  • Preview The Course
  • Installation Of Kali Linux O.S. In Vmware
  • 00:08:06

Section 2 : Database assessment / Database Hacking Practicals

  • Lecture 1 :
  • jSQL tool
  • Database penetration Lab - 1
  • 00:16:15
  • Lecture 2 :
  • SQLite Database
  • Learn SQLite Database Basics
  • 00:11:20
  • Lecture 3 :
  • Sqlsus Tool
  • Database Penetration Lab - 2
  • 00:20:25

Section 3 : Password Attacks Using Kali linux

  • Lecture 1 :
  • Create your own dictionary using Crunch
  • Create Dictionary using characters with special characters and numeric values
  • 00:16:38
  • Lecture 2 :
  • Cewl - Count Words/Characters
  • Count frequency of characters / words in web pages
  • 00:15:22
  • Lecture 3 :
  • Crack Linux Password
  • Crack shadow password using john the ripper
  • 00:11:00
  • Lecture 4 :
  • Crack FTP username and Password using Medusa
  • Crack FTP username and password with the setup of filezilla and Medusa
  • 00:16:22
  • Lecture 5 :
  • Crack FTP username and Password using Hydra
  • Crack FTP username and password with the setup of filezilla and Hydra
  • 00:10:57

Section 4 : Vulnerability Analysis Tools in Kali linux

  • Lecture 1 :
  • Golismero Tool
  • Vulnerability Analysis Lab - 1
  • 00:11:27
  • Lecture 2 :
  • Lynis Tool
  • Vulnerability Analysis Lab - 2
  • 00:10:33
  • Lecture 3 :
  • Nikto
  • Vulnerability Analysis Lab - 3
  • 00:10:34
  • Lecture 4 :
  • Nmap - Port Scanner
  • Vulnerability Analysis Lab - 4
  • 00:13:15

Section 5 : Web Application Analysis Tools in Kali linux

  • Lecture 1 :
  • Burp Suite Setup
  • How to setup Burpsuite Software
  • 00:16:54
  • Lecture 2 :
  • Burp Suite Practical
  • Use of Burp Suite Scanner
  • 00:16:31
  • Lecture 3 :
  • Skipfish
  • Web Application Analysis Tool - Skipfish
  • 00:11:55
  • Lecture 4 :
  • Wordpress Website Scanning using wpscan
  • 00:13:24

Section 6 : Information Gathering Techniques

  • Lecture 1 :
  • Informaion Gathering using Recon-ng
  • Recon-ng tool to gather information about websites/servers
  • 00:19:37
  • Lecture 2 :
  • Netdiscover
  • Passive Scanning Tool
  • 00:04:34
  • Lecture 3 :
  • Dmitry Tool
  • Gather Information About Host
  • 00:09:37
  • Lecture 4 :
  • Sparta Tool
  • Network Infrastructure Penetration Testing Tool
  • 00:07:34

SUNIL GUPTA,

I am Sunil K. Gupta . I am a Computer Science Engineer as well as a web Security Specialist working in the field of Cyber Security . In cyber Industry we work on different hacking tools and techniques . When it comes to cybersecurity, hacking comes in many colors: white, grey, black, and shades in between. White hat hackers use their skills for good. They practice ethical hacking: involved testing to see if an organization's network is vulnerable to outside attacks . My strengths are:- ◆ Vulnerability Assessment ◆ Penetration Testing ◆ Wi-Fi Assessment ◆ Intrusion Detection ◆Risk's Identification ◆ Data Analysis ◆ Report and Briefing. Best Security Tools I have used :- Class-Dump-Z, Cycript, GNU Debugger, Fiddler, Nmap, Wikto, Brutus, WireShark, Burp Proxy, Paros Proxy, Cain and Abel, John the Ripper, Hydra, Metasploit, netcat, openssl, ike tools, Back track tools, Nessus, IBM-AppScan, Acunetix, Nikto, NetSparker, MicrosoftBaseline Security Analyzer (MBSA), Web Securify, Nipper. Platforms - Windows, Linux operating System.

Students also may like