Categories

There are currently no items in your shopping cart.

User Panel

Forgot your password?.

Kali Linux Deep Dive


Getting Started:
About the Author
About the Course
Course Prerequisites
Community and Support
Disclaimer: It Is Not Like in the Movies!

Basics and Orientation:
What Is What
Where Is What
Linux Command Line Review

System Controls:
Services
Firewalls
Users

Creating a Kali Linux Live USB:
Introduction
Installing Kali Linux — Part 1
Installing Kali Linux — Part 2
Building a Custom Kali Linux Image
Creating a Live USB
Booting from a Live USB
Adding Encrypted Persistent Storage
Finalizing and Testing the Live USB

Introduction:
What Is Social Engineering?
Don't Be an Easy Target!

Social Engineering Attacks:
Circles of Trust
Keyloggers
ATMs and Banks
Physical Access to Devices

Introduction:
Real Anonymity vs. Perceived Anonymity
Common Pitfalls

Virtual Private Networks (VPNs):
What Is a VPN?
Setting Up a VPN: Server Side — Part 1
Setting Up a VPN: Server Side — Part 2
Setting Up a VPN: Server Side — Part 3
Setting Up a VPN: Client Side
Connecting to a VPN

Tor:
What Is Tor?
Tor Browser
The Tor Service

Proxies:
What Is a Proxy?
Setting Up a SOCKS5 Proxy
Connecting to a Proxy

Email Phishing and Tracking:
Introduction to Phishing and Tracking
Setting Up Email Tracking
Let's Go Phishing!

Spoofing Techniques:
ARP Spoofing
MAC Address Spoofing
DHCP Starvation

Scanning Techniques:
Google Dorks
WHOIS and GeoIP Lookup
Nmap
Host Discovery
Open Port Discovery
Network Mapping
Service and Service Version Detection
Identifying the Operating System
Vulnerability Scans

DoS/DDoS Attacks:
What Are DoS and DDoS Attacks?
Famous DDoS Attacks

Let's Get Cracking!:
Scanning Networks, Capturing a Handshake, and Deauthenticating Clients
Password Cracking: Math, Common Sense, and Limits
Setting Up the Environment and Installing GPU Drivers
Using Hashcat and Password Masks
Hashcat Wrap-Up

Buffer Overflow:
What Is Buffer Overflow?
Using Buffer Overflow to Bypass Authentication

Introduction to Reverse Engineering:
What Is Reverse Engineering?

Customizing and Compiling a Keylogger:
Setting Up an IDE to Compile a Keylogger
Getting, Importing, and Compiling the Source Code
Compiling and Customizing the Source Code
Testing Out the Keylogger

Analyzing and Reverse Engineering an Executable:
Detecting Process Abnormalities in the Task Manager
Analyzing Processes with Cheat Engine
Determining What an Unknown Program Is Doing — Part 1
Determining What an Unknown Program Is Doing — Part 2
Analyzing an Executable with a Decompiler
Decompiling Function Parameters and Variables
Reverse Engineering Function Logic with a Decompiler — Part 1
Reverse Engineering Function Logic with a Decompiler — Part 2
Reverse Engineering Function Logic with a Decompiler — Part 3
Finding Salts in Decompiled Code
Writing a Decryption Program from Pseudocode — Part 1
Writing a Decryption Program from Pseudocode — Part 2
Writing a Decryption Program from Pseudocode — Part 3
Reverse Engineering Wrap-Up

The Metasploit Framework:
What Is Metasploit?
Basic Commands
Other Useful Metasploit Commands
Database Setup and ExploitDB
Exploit Usage
The Post-Exploitation Phase
Armitage
Shellshock
Executing Code Remotely with Shellshock
Writing an NSE Script: Headers
Writing an NSE Script: Rules
Writing an NSE Script: Actions
Debugging an NSE Script — Part 1
Debugging an NSE Script — Part 2
Examining a Metasploit Module
Module Script Outline
Loading a Module into Metasploit and Performing a Syntax Check
Deploying and Testing a Script

Final Steps:
What's Next?