Course Outline
Introduction
Python in Depth
- Strings and expressions
- Functions and conditionals
- Variables and lists
Penetration Testing
- What is penetration testing?
- The five phases of penetration testing
Overview of Kali Linux
- Kali deployments
- Exploit methods
- The Kali menu and toolbox
Preparing the Development Environment
- Installing a virtual machine
- Installing and configuring Kali Linux
- Installing and configuring Python Kali Linux
- Setting up a Box Lab
System Shells
- Using Weevely
- Generating shellcode with MSFvenom
- Injecting images with jhead
- Using shellcode in exploits
Python and Kali Linux
- Creating a penetration program with Python
- Working with TCP Client and TCP Service
- Using raw binary packets
- Port scanning with NMAP
Mapping
- Applying sniffing methods
- Using SQL injection: offensive and defensive
- Implementing brute force methods
Metasploitable
- Targeting Metasploitable
- Exploiting the distribute compile system
- Exploiting network files
- Achieving root
End-to-End Testing
- Exploiting with EternalBlue
- Using Devel exploits
- Using Kronos exploits
Summary and Conclusion
Requirements
- An understanding of network vulnerabilities
Audience
- Penetration Testers
- Security Engineers
- Ethical Hackers
Testimonials (5)
he was patience and understood that we fall behind
Albertina - REGNOLOGY ROMANIA S.R.L.
Course - Deploying Kubernetes Applications with Helm
OC is new to us and we learnt alot and the labs were excellent
sharkey dollie
Course - OpenShift 4 for Administrators
let me know more Veeam skill
Joe Leung - HA
Course - Veeam Backup and Replication
Everything. It was very understandable, and if we didn't understand something, Adriano explained it.
Zsolt Nagy - W.UP Kft
Course - OpenShift Container Platform for Developers
I mostly enjoyed the knowledge of the trainer.