Gaining Access and Covering Your Tracks with Kali Linux

Gaining Access and Covering Your Tracks with Kali Linux

.MP4, AVC, 740 kbps, 1920x1080 | English, AAC, 317 kbps, 2 Ch | 1h 48m | 620 MB

Instructor: Sean Oriyano
Gain access to a system using a portfolio of different techniques

Kali Linux contains a large amount of penetration testing tools from various different niches of the security and forensics fields. The Kali Linux penetration testing platform contains a vast array of tools and utilities, from information gathering to final reporting, that enable security and IT professionals to assess the security of their systems.

This course covers how to gain access to a system using a portfolio of different techniques, each designed to approach the problem from a different angle. Topics covered will be password cracking, NTP, and others. In the second portion of the course you'll be introduced to a group of techniques designed to reduce or eliminate tracks that is left behind as a result of an attack.

In this course we will explore the third and fourth phases of a pentest: exploiting access and covering tracks. This course starts with gaining Remote access using netcat, HTTP tunnels, and executing commands. You will further learn how to crack passwords to gain access to a system using brute-force attacks and rainbow tables.

By the end of this course, you'll have learned how to extract and remove log file information from a system.

Style and Approach

The approach this course adopts is a combination of theory followed by hands-on application of the relevant tool. Each section will focus on a specific tool, its expectations, and goals.

What You Will Learn

Act upon information about a target
The types of applications and commands you can run on a remote system
Learn what type of evidence is left behind after an attack
Remove or minimize evidence left behind on a targeted system
Find internal hosts, identify internal services, and locate directory services
Execute commands with netcat
Use the http-tunnel and execute commands
Create and use rainbow tables
Extract and remove log file information from a system

Download:

http://longfiles.com/865o4hob2cic/Gaining_Access_and_Covering_Your_Tracks_with_Kali_Linux.rar.html

[Fast Download] Gaining Access and Covering Your Tracks with Kali Linux


Related eBooks:
Internet of Things Security : Fundamentals, Techniques and Applications
Leveraging Advances in Social Network Thinking for National Security : Proceedings of a Workshop
Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementatio
Cybersecurity Test and Evaluation Guidebook 2.0
Leveraging Advances in Social Network Thinking for National Security : Proceedings of a Workshop
Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementatio
Bombs, IEDs, and Explosives
Computer Safety, Reliability, and Security: SAFECOMP 2017 Workshops
Information Security and Cryptology
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
BIT WARS: Cyber Crime, Hacking & Information Warfare: Volume 2
Security and Auditing of Smart Devices
Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
ads300
histats code