Kali Linux – Complete Training Program from Scratch

Kali Linux – Complete Training Program from Scratch

English | MP4 | AVC 1280×720 | AAC 44KHz 2ch | 18 Hours | 3.75 GB

Leverage the power of Kali Linux. Start from scratch and go on to learn most advanced aspects of Kali Linux.

Kali Linux is specifically tailored to the needs of penetration testing professionals. Kali Linux is a Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing. Kali contains several hundred tools aimed at various information security tasks, such as Penetration Testing, Forensics and Reverse Engineering. Kali Linux is developed, funded and maintained by Offensive Security.

Kali Linux will prepare you to enter the world of professional hacking by ensuring that you are well versed with the skills needed and tools used to compromise the security of enterprise networks and information systems. It is no longer sufficient to merely rely on traditional security measures. In order to ensure the security of critical information assets, it is essential to become familiar with the strategies, tactics, and techniques that are used by actual hackers who seek to compromise your network.

Table of Contents

1. Introduction
001 Introduction
002 What is Ethical hacking and Penetration testing

2. Installation and Configuration
003 Kali Linux
004 Operating systems Overview
005 Concepts on Operating systems
006 Installing Operating Systems
007 Installing vmware tools
008 Configuring Kali Linux
009 Installing Kali Linux on MacBook

3. Footprinting and Reconnaisance
010 What is Footprinting
011 Footprinting Objectives
012 Footprinting Tools
013 Introduction to Google Hacking
014 Nuts and Bolts of Google Hacking
015 Google Hacking Processes
016 Who is lookup
017 DNS footprinting Overview
018 DNS footprinting Functions and Process
019 Determining Operation System
020 Introduction to Phishing Attacks
021 Phishing Attacks Details
022 Connecting information database
023 Introduction to Nmap and ZenMap
024 Nmap
025 ZenMap

4. Harvester, WHO, DNS, URL
026 The Harvester Overview
027 The Harvester Process and Functions
028 WHO IS and dnsenum Overview
029 DNSenum
030 URLcrazy
031 DNSdict
032 DNSrecon
033 DNSmapping

5. Social Engineering and information Gathering
034 Introduction to Social Engineering and information Gathering
035 Types of Social Engineering
036 Social Engineering attacks
037 Spear-phishing Attack
038 Phishing Attack
039 Phishing Attack Consequences
040 Mass mailer Attack

6. Trojans and Computer Malwares
041 Introduction to Computer Malwares
042 Types of Computer Malwares
043 Dangerous viruses of all time
044 Some Prominent Dangerous viruses of all time
045 Installing Rootkit Hunter

7. Trojans and Backdoors
046 Backdoor Overview
047 Backdoor Process and Functions
048 Backdoor – Gaining Access
049 Backdoor – Maitaining Access
050 Backdoor – Maitaining Access Continued
051 Introducing Command prompt backdoor
052 Command prompt backdoor Details
053 Meterpreter Backdoor

8. Advanced Concepts on Trojans and Computer Malwares
054 I am Root
055 Forensic escaping
056 Hacking win7 SAM database
057 Jack the ripper
058 Meterpreter commands
059 PDF embedded Trojan Horse
060 Introduction to Java Applet Attack Method
061 Java Applet Attack Method Continues
062 MITM Attack
063 ARP Poisoning

9. DNS spoofing vs DNS poisoning
064 DNS spoofing vs DNS poisoning
065 DNS spoofing
066 Advanced Concepts on DNS spoofing
067 DHCP Spoofing
068 Port Stealing

10. ICMP Redirection
069 Introduction to ICMP redirection
070 ICMP redirection Visual Chart
071 ICMP redirection Process and Functions

11. Trojans, Networks and EvilGrade
072 Killing a Network
073 Ddosing unauthorised Network
074 Driftnet
075 Introducing EvilGrade
076 EvilGrade Continues

12. Denial of Service Attack
077 Introduction to DoS
078 DoS vs DDoS
079 Levels of Ddos Attacks
080 Preventing DDoS Attacks
081 Introduction to DDoSing Windows 7
082 DDoSing Windows 7 methods

13. Ethical Hacking and Penetration testing
083 Introduction to Hacking
084 Hacking through Android
085 Hacking Android via Kali Linux

14. Password Cracking
086 Introduction to Password Cracking
087 Password cracking Strategy
088 Password cracking Strategy shown in Practicals
089 Windows Password cracking Overview
090 Nuts and Bolts of Windows Password cracking Strategy
091 Introduction to Linux Hash Cracking
092 Linux Hash Cracking Strategy
093 Generating wordlist Overview
094 Generating wordlist Process and Functions
095 CeWL cracking

15. Wireless Hacking
096 WEP and WPA
097 WPA Continues
098 802.1X standard
099 Wireless cracking Overview
100 Wireless cracking via Kali Linux

16. Meterpreter
101 Meterpreter Overview
102 Activating Payloads

17. Metasploit
103 Msfconsole explained
104 Msfconsole commands
105 Exploits
106 Payloads
107 Generating payloads

18. SQL injection
108 Intro to SQL injection
109 SQL injection to google dorks
110 SQL mapping via Kali Linux
111 Gathering Password and cracking the hash

19. Cryptography
112 Introduction to Cryptography
113 Basic Concepts on Cryptography
114 Hash Func and Oracle Method
115 Birthday Theorem Digital Signature
116 Pros and Cons of Cryptography

20. Metasploit Database
117 Importing Databases
118 Exporting Databases
119 Exporting Databases shown in Practicals