Easy Hacking with Security Tools - Workshop eBook

$29.00

25 items sold


Get the access to all our courses via Subscription

Subscribe

Categories: ,

Welcome. In this workshop  we will present lots of hacking tricks and techniques you can achieve with Kali Linux. In fact, you can perform complete end-to-end hacking with Kali Linux. When thinking about hacking you might think that it’s a difficult job, but with Kali, this job will be much easier and all the instructions will be presented in this workshop.

This e-book contains text materials from the course.

>>CHECK THE COURSE<<


>>TABLE OF CONTENT<<

Module 1 – Setting up your Virtual Environment

    • Prerequisites
    • Building the Virtual Hacking Environment
    • Setup up virtual machine and install Kali Linux (master operating system)
    • Victim Machine (Microsoft Windows)
    • Victim Machine (Metasploitable)  Victim Machine (kioptrix)
    • Kioptrix Hacking Challenges
    • OS for Web for Pen testers
    • DVWA

Module 2 – Kali Linux and Ethical Hacking

    • Introduction
    • Prerequisite
    • Knowledge Base
    • What is Ethical Hacking?
    • How to Ethically Hack?
    • Phases of Ethical Hacking
    • Phase 1 – Reconnaissance
    • Example
      • Role of Kali Linux
      • Tool: unicornscan
    • Phase 2 – Scanning
      • Download and Install Nessus (Home Feed)
      • Configure Nessus Scan Policy.
    • Phase 3 – Gaining Access
      • Exploiting Windows Machine to gain Shell Access
    • Phase 4 – Maintaining Access
    • Phase 5 – Covering Tracks

Module 3 

  • Introduction
  • Prerequisites
    • Kali Linux Exploit Development Support
    • Kali and Metasploit
    • Fuzzing and Kali Linux
    • Kali Linux & EIP Offset
    • Kali and Shellcode

Module 4 – Top 10 Security Tools in Kali Linux

  • Introduction
  • Prerequisites
  • Top Ten Security Tools available in Kali Linux
    • 1   Aircrack
    • 2  Burp Suite Free edition
    • 3  Hydra
    • 4  John the Ripper
    • 5  Maltego
    • 6  Metasploit Framework
    • 7  NMAP
    • 8  Owasp Zap
    • 9  SQLMAP
    • 10 Wireshark

Module 5 – Kali Linux Comparison with Other security distributions

    • Introduction
    • Known Hacking Distributions (Operating Systems)
        • 1   Blackbuntu
        • 2  NodeZero Linux
        • 3  BackBox
        • 4  Samurai Web Testing Framework
        • 5  STD Linux

Reviews

There are no reviews yet.

Be the first to review “Easy Hacking with Security Tools - Workshop eBook”

Your email address will not be published. Required fields are marked *

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023

Download Free eBook

Step 1 of 4

Name(Required)

We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.