CG数据库 >> Hands-On Infrastructure Penetration Testing

$125 | Duration: 2h 37m | Video: h264, 1920x1080 | Audio: AAC, 48kHz, 2 Ch | 489 MB

Genre: eLearning | Language: English | January 31, 2019

A one-stop solution to protect your network devices and modern operating systems from attacks using Kali Linux

Video Description

Are you a system administrator, penetration tester, or network engineer and do you want to take your penetration testing skills to the next level? Then this course is for you. It is your one-stop solution to safeguarding complex network devices and modern operating systems from external threats using Kali Linux.

This course will provide you with advanced penetration testing techniques with Kali Linux that will help you exploit databases and web/applications servers and perform network penetration. With this course, you will prevent your system from being exploited by using techniques such as reverse shells. Moving on, this course will not only walk you through managing vulnerabilities but will also show you how to protect endpoints. You will explore web pentesting, learn how to set up your LAB environment, and explore the various vulnerabilities that exist nowadays. Towards the end of this course, you will also perform wireless penetration testing to defend against the wireless assets.

Finally, you will have mastered the skills and methodologies you need to breach infrastructures and provide complete endpoint protection for your system via Kali Linux.

All the code and supporting files for this course are available from Github at

Style and Approach

This comprehensive course takes you through penetration testing with Kali Linux and is packed with step-by-step instructions and working examples

Table of Contents

LAB SETUP AND OVERVIEW

EXPLORE PENETRATION TESTING

AVOID SYSTEM EXPLOITATIONS

INTRODUCTION TO WEBSITE PENETRATION TESTING

PERFORM NETWORK PENETRATION TESTING

What You Will Learn

Set up your environment for performing penetration testing using Kali Linux

Create a persistent reverse shell

Perform penetration testing on your websites

Perform de-authentication attacks on Wi-Fi routers

Use GPU power for hacking WPA2 Wi-Fi routers

Authors

Parvinder Yadav

Parvinder Yadav has worked with wireless penetration testing for more than 4 years and has a deep knowledge of networking. He has created a lot of projects such as a Wi-Fi jammer using shell scripting and the Raspberry Pi 2; a portable hacking device which just weighs 100 grams and can hack almost any Wi-Fi router; a portable wireless CCTV camera (using the Raspberry Pi) that is the same size as a mobile; a portable media server; a radio station using the Raspberry Pi; and a lot more. He is the author of PNPtutorials, he is a geeky YouTuber and a Tech-Freak, and has more than 55K subscribers to his channel on YouTube.


Hands-On Infrastructure Penetration Testing的图片1
Hands-On Infrastructure Penetration Testing的图片2

发布日期: 2019-02-02