Lynda - Introduction to Kali Linux

seeders: 2
leechers: 9
Added on April 3, 2016 by bardin Other > Tutorials
Torrent verified.



Lynda - Introduction to Kali Linux (Size: 463.88 MB)
 01_01-Welcome.mp410.59 MB
 01_02-What you should know.mp41.1 MB
 02_01-Introduction to virtualization.mp414.46 MB
 02_02-Setting up a virtual lab.mp419.41 MB
 02_03-Installing virtual machines.mp421.85 MB
 02_04-Installing appliances.mp410.99 MB
 02_05-Getting Metasploitable and Windows VMs.mp416.65 MB
 02_06-Working with advanced configuration in VirtualBox.mp48.73 MB
 03_01-What is Kali.mp410.23 MB
 03_02-Explore the quick access list.mp423.19 MB
 03_03-Change screensaver and font settings.mp48.18 MB
 03_04-Explore the applications in Kali.mp413.7 MB
 03_05-Update Kali.mp47.75 MB
 04_01-Reviewing the tools.mp44.53 MB
 04_02-Introducing DMitry.mp48.55 MB
 04_03-Introducing DNSenum.mp410.75 MB
 04_04-Introducing Maltego.mp422.2 MB
 05_01-Reviewing the tools.mp43.01 MB
 05_02-Introducing Spike.mp45.42 MB
 05_03-Install OpenVAS.mp411.99 MB
 05_04-Run an OpenVAS scan.mp419.08 MB
 05_05-Custom scan with OpenVAS.mp44.51 MB
 05_06-Explore the OpenVAS menu.mp414.04 MB
 05_07-Install Vega.mp44.75 MB
 05_08-Web crawling with Vega.mp410.61 MB
 05_09-Use Vega as a web proxy.mp411.96 MB
 05_10-Review Vegas menus.mp42.65 MB
 06_01-Password testing.mp422.56 MB
 06_02-Use commandline tools.mp411.09 MB
 06_03-Windows Credential Editor.mp47.26 MB
 06_04-Use John the Ripper in Linux.mp47.93 MB
 06_05-Use John for Windows passwords.mp48.82 MB
 06_06-Explore Johnnys options.mp413.45 MB
 06_07-Pass the hash.mp48.86 MB
 06_08-Use rainbow tables.mp412.82 MB
 07_01-Overview of exploitation tools.mp46 MB
 07_02-Exploit Linux with Metasploit.mp422.26 MB
 07_03-Exploit Windows with Armitage.mp415.21 MB
 07_04-More exploiting with Armitage.mp46.43 MB
 07_05-Pivot through a network.mp48.39 MB
 07_06-Install persistent access.mp48.23 MB
 08_01-Next steps.mp43.7 MB

Description




Kali Linux is a flavor of Linux targeted at digital forensics experts and penetration (pen) testers. It includes over 400 pen-testing programs, and it is the primary tool used by ethical hackers. Using Kali Linux, certified ethical hackers can test networks on their organizations' behalves, to see if they're vulnerable to outside attacks.
This course will give prospective ethical hackers a short overview of the tools in Kali Linux. Cybersecurity expert Malcolm Shore shows how to set up a virtual environment for testing, configure Kali Linux, and install toolsets for information gathering, vulnerability assessment, password and hash cracking, and target exploitation.
Because businesses are connected, they are also exposed. Vulnerability testing helps organizations limit that exposure. This course will help you explore the careers, techniques, and tools behind ethical hacking—one of the most competitive and sought-after IT security skills.

Introduction
1m 50s
Welcome
1m 22s
What you should know
28s

1. Setting Up the Virtual Lab
32m 6s
Introduction to virtualization
5m 28s
Setting up a virtual lab
7m 34s
Installing virtual machines
8m 11s
Installing appliances
3m 15s
Getting Metasploitable and Windows VMs
4m 34s
Working with advanced configuration in VirtualBox
3m 4s

2. Introducing Kali
15m 17s
What is Kali?
2m 13s
Explore the quick access list
5m 51s
Change screensaver and font settings
1m 53s
Explore the applications in Kali
3m 31s
Update Kali
1m 49s

3. Information Gathering (Understanding the Target)
13m 41s
Reviewing the tools
1m 4s
Introducing DMitry
2m 34s
Introducing DNSenum
2m 59s
Introducing Maltego
7m 4s

4. Vulnerability Analysis
27m 18s
Reviewing the tools
46s
Introducing Spike
1m 9s
Install OpenVAS
2m 57s
Run an OpenVAS scan
6m 16s
Custom scan with OpenVAS
1m 22s
Explore the OpenVAS menu
5m 0s
Install Vega
1m 6s
Web crawling with Vega
3m 45s
Use Vega as a web proxy
4m 19s
Review Vega's menus
38s

5. Passwords and Hashes
26m 33s
Password testing
6m 32s
Use command-line tools
3m 18s
Windows Credential Editor
2m 41s
Use John the Ripper in Linux
1m 54s
Use John for Windows passwords
2m 12s
Explore Johnny's options
3m 57s
Pass the hash
2m 17s
Use rainbow tables
3m 42s

6. Exploiting Targets
23m 7s
Overview of exploitation tools
1m 33s
Exploit Linux with Metasploit
5m 29s
Exploit Windows with Armitage
6m 16s
More exploiting with Armitage
2m 45s
Pivot through a network
3m 38s
Install persistent access
3m 26s

Conclusion
59s
Next steps
59s

Sharing Widget


Download torrent
463.88 MB
seeders:2
leechers:9
Lynda - Introduction to Kali Linux