IT Security Gumbo: Exploitation With Kali
Hands On Penetration Testing with Kali LinuxIT Security Gumbo: Exploitation with Kali
This course consists of 100% hands-on technical labs, utilizing Kali Linux to hack a variety of intentionally vulnerable operating systems. All of the resources to build the labs are free. Detailed instructions on how to set up the labs are included within this course. To make the most out of this course, it is recommended that you actually perform the activities within the labs rather than just watch the videos.
1. Exploiting Services
- Samba Exploit
- IRC Exploit
- Java RMI Exploit
- Using MSF
- Using HTTP
- Using BadBash
- Kernel Exploit
- Empire and Setoolkit
Who this course is for:
- Cybersecurity Students
- Cybersecurity Professionals
- CEH Candidates
Goals
What will you learn in this course:- Perform remote exploitation of systems
- Escalate local privileges to root level
- Utilize a variety of industry standard penetration testing tools within the Kali Linux distro
Last edited by a moderator: