Penetration Testing: Python and Kali Linux Treningskurs

Last updated




14 timer (vanligvis 2 dag inkludert pauser)


  • An understanding of network vulnerabilities


  • Penetration Testers
  • Security Engineers
  • Ethical Hackers


Kali Linux is a Linux distribution created for digital forensics and penetration testing. With Python, users can develop penetration testing programs in Kali Linux.

This instructor-led, live training (online or onsite) is aimed at penetration testers, security engineers, and ethical hackers who wish to penetrate test networks in Kali Linux using Python.

By the end of this training, participants will be able to:

  • Create Python programs to seek network vulnerabilities.
  • Explore and use Kali web shells and shellcode in exploits.
  • Apply various Kali tools for penetration testing.
  • Exploit systems with Python code.

Format of the Course

  • Interactive lecture and discussion.
  • Lots of exercises and practice.
  • Hands-on implementation in a live-lab environment.

Course Customization Options

  • To request a customized training for this course, please contact us to arrange.



Python in Depth

  • Strings and expressions
  • Functions and conditionals
  • Variables and lists

Penetration Testing

  • What is penetration testing?
  • The five phases of penetration testing

Overview of Kali Linux

  • Kali deployments
  • Exploit methods
  • The Kali menu and toolbox

Preparing the Development Environment

  • Installing a virtual machine
  • Installing and configuring Kali Linux
  • Installing and configuring Python Kali Linux
  • Setting up a Box Lab

System Shells

  • Using Weevely
  • Generating shellcode with MSFvenom
  • Injecting images with jhead
  • Using shellcode in exploits

Python and Kali Linux

  • Creating a penetration program with Python
  • Working with TCP Client and TCP Service
  • Using raw binary packets
  • Port scanning with NMAP


  • Applying sniffing methods
  • Using SQL injection: offensive and defensive
  • Implementing brute force methods


  • Targeting Metasploitable
  • Exploiting the distribute compile system
  • Exploiting network files
  • Achieving root

End-to-End Testing

  • Exploiting with EternalBlue
  • Using Devel exploits
  • Using Kronos exploits

Summary and Conclusion



Related Categories

Relaterte kurs


Kursrabatter Nyhetsbrev

We respect the privacy of your email address. We will not pass on or sell your address to others.
You can always change your preferences or unsubscribe completely.

Some of our clients

is growing fast!

We are looking to expand our presence in Norway!

As a Business Development Manager you will:

  • expand business in Norway
  • recruit local talent (sales, agents, trainers, consultants)
  • recruit local trainers and consultants

We offer:

  • Artificial Intelligence and Big Data systems to support your local operation
  • high-tech automation
  • continuously upgraded course catalogue and content
  • good fun in international team

If you are interested in running a high-tech, high-quality training and consulting business.

Apply now!

This site in other countries/regions