Learn Python with Generative AI - Self Paced Online
The Fastest Way to Become a Backend Developer Online
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Learn how to use Kali Linux for advanced penetration testing, including stealthy testing, privilege escalation, tunneling and exfiltration, and pivoting.
Syllabus
Introduction
- Using Kali Linux as the basis for advanced penetration testing
- What you should know
- Disclaimer
- Testing with Kali Linux
- Understanding Kali deployments
- Preparing your toolbox
- Preparing to use exploits for testing
- Managing the Kali menu
- Using the LinkedIn Learning penetration testing lab
- Introduction to shells
- Exploring Kali webshells
- Weeving a shell
- Generating shellcode with msfvenom
- Injecting images with jhead
- Using shellcode in exploits
- Exploiting systems with Kali
- Exploiting with Python
- Exploiting with Perl
- Exploiting with C
- Exploiting with CPP
- Obtaining Windows passwords
- Obtaining Linux passwords
- Targeting Metasploitable
- Exploiting VSFTPD
- Exploiting with ProFTPD
- Exploiting Tomcat
- Exploiting IRC
- Exploiting the distributed compile system
- Exploiting network files
- Hiding in plain sight
- Escalating to root
- Starting with online labs
- Exploiting rejetto
- Exploiting the Devel
- Time to exploit Cronos
- Cronos revisited: Getting to the root
- Using a nightmare escalator
- Next steps
Taught by
Malcolm Shore