Last updated
Kurskode
pykali
Varighet
14 timer (vanligvis 2 dag inkludert pauser)
Krav
- An understanding of network vulnerabilities
Audience
- Penetration Testers
- Security Engineers
- Ethical Hackers
Oversikt
Kali Linux is a Linux distribution created for digital forensics and penetration testing. With Python, users can develop penetration testing programs in Kali Linux.
This instructor-led, live training (online or onsite) is aimed at penetration testers, security engineers, and ethical hackers who wish to penetrate test networks in Kali Linux using Python.
By the end of this training, participants will be able to:
- Create Python programs to seek network vulnerabilities.
- Explore and use Kali web shells and shellcode in exploits.
- Apply various Kali tools for penetration testing.
- Exploit systems with Python code.
Format of the Course
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
Kursplan
Introduction
Python in Depth
- Strings and expressions
- Functions and conditionals
- Variables and lists
Penetration Testing
- What is penetration testing?
- The five phases of penetration testing
Overview of Kali Linux
- Kali deployments
- Exploit methods
- The Kali menu and toolbox
Preparing the Development Environment
- Installing a virtual machine
- Installing and configuring Kali Linux
- Installing and configuring Python Kali Linux
- Setting up a Box Lab
System Shells
- Using Weevely
- Generating shellcode with MSFvenom
- Injecting images with jhead
- Using shellcode in exploits
Python and Kali Linux
- Creating a penetration program with Python
- Working with TCP Client and TCP Service
- Using raw binary packets
- Port scanning with NMAP
Mapping
- Applying sniffing methods
- Using SQL injection: offensive and defensive
- Implementing brute force methods
Metasploitable
- Targeting Metasploitable
- Exploiting the distribute compile system
- Exploiting network files
- Achieving root
End-to-End Testing
- Exploiting with EternalBlue
- Using Devel exploits
- Using Kronos exploits
Summary and Conclusion