O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Kali Linux - Backtrack Evolved: Assuring Security by Penetration Testing

Video Description

Packt video courses are designed to cover the breadth of the topic in short, hands-on, task-based videos. Each course is divided into short manageable sections, so you can watch the whole thing or jump to the bit you need. The focus is on practical instructions and screencasts showing you how to get the job done. Many advanced techniques are addressed within this series, but it is still designed to simultaneously accommodate less experienced viewers. The series provides detailed explanations intended to clearly address the underlying processes involved with all tasks performed. Kali Linux - Backtrack Evolved: A Penetration Tester’s Guide is a great choice for anybody interested in information security, penetration testing or ethical hacking. While a basic understanding of Linux and TCP/IP will be helpful in understanding the content, it is not essential.

Table of Contents

  1. Chapter 1: Lab Preparation
    1. Developing a Network Environment 00:02:17
    2. How to Install Oracle VirtualBox 00:03:02
    3. How to Install VMware Player 00:03:07
    4. How to Install Kali Linux 00:03:52
    5. Increasing Network Attack Surface 00:03:51
  2. Chapter 2: Information Gathering and Reconnaissance
    1. Passive Reconnaissance 00:04:11
    2. Google Hacking 00:04:26
    3. Subdomain Enumeration with Google Hacking 00:03:40
    4. Reconnaissance Tools (Dmitry & Goofile) 00:03:12
    5. Network Enumeration with Maltego 00:03:31
  3. Chapter 3: Target Discovery
    1. Layer 2 Discovery 00:03:43
    2. Layer 3 Discovery 00:05:22
    3. Host Discovery with nmap 00:04:37
    4. Network Discovery with Scapy 00:04:30
    5. Fingerprinting Operating Systems 00:02:55
  4. Chapter 4: Scanning and Enumeration
    1. Scanning with nmap 00:03:23
    2. Scanning with Zenmap 00:04:33
    3. Nmap Scripting 00:04:53
    4. Zombie Scanning 00:03:36
    5. Service Identification 00:04:02
  5. Chapter 5: Vulnerability Mapping
    1. Metasploit Auxilliary Scans 00:03:13
    2. Installing Nessus 00:04:40
    3. Nessus Scanning 00:04:04
    4. Nessus Policies 00:03:40
    5. Nessus Result Analysis 00:03:55
  6. Chapter 6: Exploitation with Metasploit
    1. Metasploit Framework 00:04:45
    2. Meterpreter Basics 00:04:15
    3. Meterpreter - Advanced Exploitation 00:03:45
    4. Installing Metasploit Pro 00:02:08
    5. Exploitation with Metasploit Pro 00:04:56
  7. Chapter 7: Hands-on Exploitation
    1. Exploit Database 00:05:30
    2. Social Engineering Toolkit - Credential Harvester 00:05:11
    3. Burp Suite Intruder 00:05:22
    4. Web Application Exploitation 00:06:02
    5. Maintaining Access 00:05:26
  8. Chapter 8: Privilege Escalation
    1. Ettercap 00:04:11
    2. Hash Identifier / Find-My-Hash 00:03:39
    3. Hydra 00:03:58
    4. John the Ripper 00:04:11
    5. Johnny / xHydra 00:04:11