O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Introduction to Penetration Testing

Video Description

In this Introduction to Penetration Testing training course, expert author Ric Messier will teach you how to find and analyze vulnerabilities in systems and networks with Kali Linux. This course is designed for the absolute beginner, meaning no penetration testing experience is required.

You will start by learning about reconnaissance, including DNS, using job sites, social networking investigation, and using Wireshark filters. From there, Ric will teach you about scanning and vulnerability analysis, including setting up and starting an OpenVAS scan, ExploitDB, and vulnerability research using CVEs. This video tutorial also covers Metasploit, including adding hosts to the database, using Metasploit for scans, and exploits with Metasploit. Finally, you will learn about website testing.

Once you have completed this computer based training course, you will have learned how to find and analyze vulnerabilities in systems and networks with Kali Linux.

Table of Contents

  1. Introduction
    1. Welcome 00:03:10
    2. Setting Up A Lab - VMs 00:02:45
    3. Targets - Vulnerable Hosts 00:03:46
    4. Targets - Vulnerable Web Apps 00:04:09
    5. Kali Linux 00:02:55
  2. Reconnaissance
    1. Google Hacking 00:03:21
    2. More Google Hacking 00:04:22
    3. Google Hacking Database 00:03:37
    4. whois 00:05:28
    5. DNS 00:05:54
    6. Browser Plugins - Wappalyzer 00:03:24
    7. Browser Plugins - PassiveRecon 00:04:54
    8. SSL-Certificate Inspection 00:05:05
    9. Browser Plugins - Cookie Watcher 00:04:24
    10. Using Job Sites 00:03:32
    11. Social Networking Investigation 00:03:21
    12. Passive Fingerprinting With p0f 00:05:07
    13. Web Recon Using recon-ng 00:03:30
    14. DNS Reconnaissance Using DNSRecon And DSNWalk 00:03:35
    15. Determining Firewall Rules Using Firewalk 00:02:53
    16. Using TheHarvester To Gather Information 00:02:12
    17. Wireshark 00:04:14
  3. Scanning
    1. nmap 00:03:37
    2. SYN Scanning 00:03:53
    3. OS Identification 00:04:25
    4. UDP Scanning 00:03:06
    5. FIN Scanning 00:03:31
    6. Idle Scanning 00:03:36
    7. nmap Scripting 00:04:34
    8. Writing nmap Scripts 00:04:52
    9. Using Telnet To Perform Port Analysis 00:03:17
    10. Netcat 00:02:24
    11. Fast Scanning – Massscan 00:04:29
    12. Massscan For Heartbleed 00:02:59
    13. More Fast Scanning – ZMap 00:04:22
    14. Evasion Using Fragroute 00:03:12
    15. Custom Packet Creation Using hping3 00:04:45
  4. Vulnerability Analysis
    1. Setting Up OpenVAS 00:03:06
    2. Starting An OpenVAS Scan 00:03:48
    3. Generating OpenVAS Report 00:04:49
    4. Nessus 00:02:47
    5. Starting Nessus Scan 00:03:01
    6. Reporting From Nessus 00:03:45
    7. Nexpose 00:02:40
    8. Starting Nexpose Scan 00:03:44
    9. Reporting From Nexpose 00:04:04
    10. ExploitDBv 00:03:56
    11. Vulnerability Research Using CVEs 00:04:18
    12. Bugtraq 00:03:00
  5. Metasploit
    1. Intro To Metasploit 00:03:22
    2. Workspaces 00:02:26
    3. Adding Hosts To The Database 00:03:35
    4. Importing Vulnerability Scans 00:02:27
    5. Searching Exploits 00:03:40
    6. Using Metasploit For Scans 00:04:50
    7. Exploits With Metasploit 00:03:47
    8. Payloads 00:03:37
    9. Armitage 00:03:22
    10. Social Engineering Toolkit 00:03:55
    11. Scripting Metasploit 00:04:20
  6. Web Site Testing
    1. w3af 00:03:20
    2. Locating Hidden Information With w3af 00:03:08
    3. Brute Force Attacks With Burp Intruder 00:04:10
    4. Scanning With OWASP ZAP 00:03:27
    5. Fuzzing With ZAP 00:03:09
    6. Passive Scanning With Ratproxy 00:02:46
    7. Spike Proxy 00:02:59
    8. SSLScan For Weak Ciphers 00:03:21
    9. Man In The Middle With SSLStrip 00:03:33
    10. Using Skipfish 00:03:35
  7. Wrapping Up
    1. What We Covered 00:03:15
    2. Next Steps 00:02:59
    3. Conclusion 00:00:32