Kali Linux - Backtrack Evolved: Assuring Security by Penetration Testing [Video]
Год выпуска: 2013
Производитель: Packtpub
Сайт производителя:
https://www.packtpub.com/networking-and-servers/kal...on-testing-videoАвтор: Justin Hutchens
Продолжительность: 02:43:47
Тип раздаваемого материала: Видеоклипы
Язык: Английский
Описание: Secure your networks against attacks, hacks, and intruders with this fast paced and intensive security course using Kali Linux.
About This Video
This course will offer a complete roadmap for the penetration testing process from start to finish.
Experience hands-on video demonstrations regarding how to use an extensive collection of tools within the Kali-Linux environment to perform penetration tests against every aspect of a target network.
Advanced techniques with detailed explanations that are useful to novice users and experienced viewers alike
Who This Video Is For
Kali Linux - Backtrack Evolved: A Penetration Tester’s Guide is a great choice for anybody interested in information security, penetration testing or ethical hacking. While a basic understanding of Linux and TCP/IP will be helpful in understanding the content, it is not essential.
Chapter 1: Lab Preparation
Developing a Network Environment
00:02:17
How to Install Oracle VirtualBox
00:03:02
How to Install VMware Player
00:03:07
How to Install Kali Linux
00:03:52
Increasing Network Attack Surface
00:03:51
Chapter 2: Information Gathering and Reconnaissance
Passive Reconnaissance
00:04:11
Google Hacking
00:04:26
Subdomain Enumeration with Google Hacking
00:03:40
Reconnaissance Tools (Dmitry & Goofile)
00:03:12
Network Enumeration with Maltego
00:03:31
Chapter 3: Target Discovery
Layer 2 Discovery
00:03:43
Layer 3 Discovery
00:05:22
Host Discovery with nmap
00:04:37
Network Discovery with Scapy
00:04:30
Fingerprinting Operating Systems
00:02:55
Chapter 4: Scanning and Enumeration
Scanning with nmap
00:03:23
Scanning with Zenmap
00:04:33
Nmap Scripting
00:04:53
Zombie Scanning
00:03:36
Service Identification
00:04:02
Chapter 5: Vulnerability Mapping
Metasploit Auxilliary Scans
00:03:13
Installing Nessus
00:04:40
Nessus Scanning
00:04:04
Nessus Policies
00:03:40
Nessus Result Analysis
00:03:55
Chapter 6: Exploitation with Metasploit
Metasploit Framework
00:04:45
Meterpreter Basics
00:04:15
Meterpreter - Advanced Exploitation
00:03:45
Installing Metasploit Pro
00:02:08
Exploitation with Metasploit Pro
00:04:56
Chapter 7: Hands-on Exploitation
Exploit Database
00:05:30
Social Engineering Toolkit - Credential Harvester
00:05:11
Burp Suite Intruder
00:05:22
Web Application Exploitation
00:06:02
Maintaining Access
00:05:26
Chapter 8: Privilege Escalation
Ettercap
00:04:11
Hash Identifier / Find-My-Hash
00:03:39
Hydra
00:03:58
John the Ripper
00:04:11
Johnny / xHydra
00:04:11
Файлы примеров: отсутствуют
Формат видео: MP4
Видео: AVC, 1280x720 (16:9), 30.000 fps, x264 core 120 ~451 Kbps avg, 0.016 bit/pixel
Аудио: 48.0 KHz, AAC LC, 2 ch, ~111 Kbps