Mastering Kali Linux
MP4 | Video: MPEG-4 1920x1080 | Audio: AAC, 48 KHz @ 144 Kbps 2ch
Duration: 2 hrs 27 mins | Language: English | 459 MB
Genre: eLearning Video
Become a master at any hackers game by discovering and understanding each of the major tools that every hacker is currently using. You will discover proper techniques to hack into any WordPress websites to test for vulnerabilities and weaknesses. Then dive deep into website and server scanning as well as network scanning and testing for any open security breaches. In addition, you will get introduced to bluetooth hacking for any open bluetooth enabled devices near you. Finally, explore the ultimate Social Engineering Toolkit embedded inside of your Kali machine.
By the end of this course, you will have mastered Kali Linux in order to be the most efficient ethical hacker to carry out proper penetration testing upon your target, as well as discovering how to increase your own networks security.
Style and Approach
A step-by-step guide to help you learn different techniques you can use in order to optimize your pen-testing time, speed, and results.
What You Will Learn
Scan your target using Recon WorkExtract usernames from WordPress websitesPerform master scanning techniques to find open ports, IP address ranges, and more.Explore website penetration with WPScan and the HarvesterHack nearby Bluetooth devicesMaster your companies' networks and carry out expert scanning and testing.Trace IP addresses and software packages and get server Intel with the Nikto and Vega methods.Set up a proper password dictionary and discover the best methods for brute-forcing techniques.
ADVANCED RECONNAISSANCE!
The Course OverviewPerforming the Right Recon WorkInstalling Recon-NGIntegrating Twitter API'sDiscovering Modules with Recon-NGExploiting Modules with Recon-NG
EXPLOITING WORDPRESS SITES
Scanning WordPress SitesEnumerating UsernamesCultivating a Password DictionaryBruteforcing LoginDiscovering Plugins and More!
FINDING VULNERABILITIES WITH SQLMAP
SQL DatabasesGoogle DorkingSite Vulnerability TestingListing Databases and Tables with SQLMapListing Usernames from TablesExtracting Passwords from Target ColumnsCracking Passwords
HACKING BLUETOOTH DEVICES
Bluetooth ToolsScan and Ping for VictimsRFComm Channel SurfingRedFangOther Tools
ADVANCED SCANNING METHODS
Port ScanningZombieNikto ScanningPerform a Stealth Scan
TARGET EXPLOITING AND TESTING
Exploring the S.E.T.Site CloningSpear FishingHarvester AttackingExploiting with Commix
SCANNING AND TESTING NETWORKS
Scanning for Live HostsDiscovering Open PortsFind Services Actively ListeningShow Anonymous FTP LoginsTest for Vulnerabilities
Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live