Companies Home Search Profile

Kali Linux: Network Scanning, Pentesting & Digital Forensic

Focused View

Packt Publishing

8:49:29

135 View
  • 001 The Course Overview.mp4
    04:14
  • 002 Brief Introduction to Digital Forensics.mp4
    06:13
  • 003 Downloading and Installing Kali Linux.mp4
    06:23
  • 004 Introduction to Forensic Imaging.mp4
    11:06
  • 005 Overview of dcfldd and dc3dd.mp4
    04:29
  • 006 Drive Imaging with dc3dd.mp4
    08:35
  • 007 Android Device Imaging with dc3dd.mp4
    11:53
  • 008 Image Acquisition with Guymager.mp4
    04:59
  • 009 Overview of the Sleuth Kit and Filesystem Analysis.mp4
    12:45
  • 010 Windows Registry Analysis with RegRipper.mp4
    09:25
  • 011 Extracting and Analyzing Browser, E-mail, and IM Artifacts.mp4
    12:28
  • 012 File Analysis Tools.mp4
    14:28
  • 013 Building a Super-Timeline of the Events.mp4
    10:26
  • 014 File Carving Overview.mp4
    06:54
  • 015 File Carving Tools.mp4
    08:26
  • 016 Extracting Data with Bulk Extractor.mp4
    05:01
  • 017 Autopsy 4 Overview and Installation.mp4
    04:58
  • 018 Analysis of a Windows Image with Autopsy.mp4
    10:24
  • 019 Analysis of an Android Image with Autopsy.mp4
    04:50
  • 020 Introduction to Memory Forensics and Acquisition.mp4
    03:58
  • 021 Memory Acquisition.mp4
    04:03
  • 022 Introduction to Volatility.mp4
    03:10
  • 023 Memory Analysis with Volatility.mp4
    04:23
  • 024 Introduction to Network Forensics.mp4
    05:05
  • 025 Capturing Network Traffic with Wireshark.mp4
    06:14
  • 026 Network Traffic Analysis with Wireshark.mp4
    04:09
  • 027 Introduction to Reporting.mp4
    03:33
  • 028 Documentation and Reporting Tools.mp4
    05:12
  • 15230888-Network-Scanning-Pentesting-Digital-Forensic-with-kali-Linux.zip
  • 001 The Course Overview.mp4
    01:33
  • 002 Installing Nessus Vulnerability Scanner.mp4
    09:51
  • 003 Using Nessus.mp4
    09:50
  • 004 Exporting Nessus Output.mp4
    05:39
  • 005 Installing OpenVas.mp4
    06:06
  • 006 Using OpenVas.mp4
    06:01
  • 007 Setting up Metasploit.mp4
    08:35
  • 008 Understanding Payloads and Exploits.mp4
    09:01
  • 009 Importing Nessus Results.mp4
    05:12
  • 010 Scanning with Metasploit.mp4
    11:31
  • 011 Metasploit Interfaces.mp4
    06:52
  • 012 Using Meterpreter.mp4
    07:29
  • 013 Creating Custom Backdoors for Different Platforms.mp4
    04:10
  • 014 Msfvenom.mp4
    10:46
  • 015 Encoders.mp4
    06:17
  • 016 Exploiting MS Office and PDF Documents.mp4
    12:10
  • 017 Social Engineering Toolkit.mp4
    06:00
  • 018 Recap of Scope.mp4
    04:26
  • 019 Information Gathered.mp4
    02:59
  • 020 Vulnerabilities Identified.mp4
    04:17
  • 021 Exploitable Vulnerabilities.mp4
    04:27
  • 022 Documentation.mp4
    08:35
  • 001 The Course Overview.mp4
    05:00
  • 002 Preparing Your Network Scanning Maching.mp4
    09:17
  • 003 Validating Network Connectivity.mp4
    05:38
  • 004 Updating Kali Software Packages.mp4
    07:04
  • 005 Adding a Non-Root User to Kali.mp4
    04:25
  • 006 Creating a System Inventory Using Nmap.mp4
    06:44
  • 007 Identifying Open Ports and Services on Systems.mp4
    04:42
  • 008 Finding and Remediating System Vulnerabilities.mp4
    04:29
  • 009 Monitoring Nmap Scans Using Verbose Logging.mp4
    05:53
  • 010 Acquiring Permission to Conduct Network Scanning.mp4
    05:38
  • 011 Finding Live Hosts on the Network.mp4
    07:35
  • 012 Specifying Port Ranges to Make Scans More Efficient.mp4
    05:05
  • 013 Nmap Output Formats.mp4
    07:59
  • 014 Using Nmap Scripts for Automating Network Scanning.mp4
    11:39
  • 015 Sparta and Eyewitness.mp4
    12:44
  • 016 Installing and Running OpenVAS in Kali.mp4
    07:19
  • 017 Basic Scanning with OpenVAS.mp4
    06:42
  • 018 Advanced Scanning with OpenVAS.mp4
    07:43
  • 019 Enumerating Websites.mp4
    08:17
  • 020 Using Nikto to Find Web-Based Vulnerabilities.mp4
    12:06
  • 021 Discovering Hidden Files and Folders.mp4
    15:38
  • 022 Finding Website Vulnerabilities with Burp.mp4
    18:21
  • Description


    A step by step guide to Digital Forensic, Pentesting & Network Scanning using various tools in Kali Linux

    What You'll Learn?


    • Leverage the power of Kali Linux as a forensic analysis platform
    • Recover deleted data bypassing the file system
    • Explore well-known tools such as Nessus and OpenVas to perform vulnerability assessments
    • Create custom backdoors using Msfvenom and Encoders
    • Exploit the target using well-known applications such as MS Office documents and PDF documents
    • Perform effective scanning with Nmap
    • Advanced OpenVAS practices for securing your network on systems
    • Manually scan your web applications for any vulnerabilities

    Who is this for?


  • Novice, Intermediate students ,Digital Forensics professionals, Experienced security tester, Pentesters who are interested in learning digital forensic, securing and gaining control of their network environment with various advanced features of Kali Linux.
  • More details


    Description

    Kali Linux is the most comprehensive distributions for pentesting and ethical hacking. It also contains popular forensics tools available to conduct professional-level forensics investigations. It also plays a very important role when it comes to securing your data or discovering loopholes within your system.

    This Learning Path is an easy-to-follow, clear and concise instructions to guide you through the practical techniques and tools using Kali Linux. You'll start with learning to perform vulnerability assessments using well-known softwares such as Nessus and OpenVas & try to exploit those vulnerabilities to show the consequences. Next you will learn about network traffic capture and analysis along with leveraging OpenVAS 9 for vulnerability scanning by finding loopholes and conquering your network environment. Finally you will learn about digital forensic which consist of how to extract and recover data, analyze the acquired data, and report and present digital evidence from a device.

    Contents and Overview

    This training program includes 3 complete courses, carefully chosen to give you the most comprehensive training possible.

    The first course, Digital Forensics with Kali Linux covers instructions for digital imaging and forensics, and shows you hashing tools to perform successful forensic analysis with Kali Linux. It start by showing you how to use the tools (dc3dd in particular) to acquire images from the media to be analyzed, either hard drives, mobile devices, thumb drives, or memory cards. The course presents the Autopsy forensic suite and other specialized tools, such as the Sleuth Kit and RegRipper, to extract and analyze various artifacts from a Windows image. Next you'll learn how to perform the analysis of an Android device image using Autopsy. It also teaches you file carving and recovery of deleted data, and then the process of acquiring and analyzing RAM memory (live analysis) using the Volatility framework. Finally, we demonstrate how to report and present digital evidence found during the analysis. By the end of the course, you will be able to extract and recover data, analyze the acquired data, and report and present digital evidence from a device.

    The second course, Finding and Exploiting Hidden Vulnerabilities cover detailed vulnerability assessment and based on the findings try to exploit the target. This course will help you understand the understand the process of VAPT (Vulnerability Assessment and Penetration Testing) step by step. So here you’ll learn how to perform vulnerability assessments using well-known softwares such as Nessus and OpenVas. After finding the vulnerabilities, the next step for a pentester is to try to exploit those vulnerabilities to show the consequences, and nothing is better for this than Metasploit Framework. This being said you’ll also learn about many key features of Metasploit Framework and use it to exploit the vulnerabilities on the target device/machine. Finally, you’ll understand why you need to document everything done during the activity. By the end of this course, you’ll have a good understanding of the approach to follow when doing VAPT for any client.

    The third course, Mastering Kali Linux network scanning covers core network scanning tasks. In this course, you'll learn to fundamentals of utilizing Kali Linux so you can gain control over your network environment. It also focuses on core network scanning tasks such as discovery scanning, port scanning, service enumeration, operating system identification, vulnerability mapping, and validating identified findings. Next, you will also learn about network traffic capture and analysis along with leveraging OpenVAS 9 for vulnerability scanning. Lastly, this course will also teach you to create your own packages and host your own custom repositories along with securing and monitoring Kali Linux at the Network and filesystem level. By the end of this video, you will be very proficient at finding loopholes and conquering your network.

    By the end of the course, you’ll have a good understanding of the approach to follow when doing VAPT for any client & also able to extract and recover data, analyze the acquired data, and report and present digital evidence from a device.

    About the Authors

    • Marco Alamanni has professional experience working as a Linux system administrator and Information Security analyst in banks and financial institutions. He holds a BSc in Computer Science and an MSc in Information Security. His interests in information technology include ethical hacking, digital forensics, malware analysis, Linux, and programming, among other things. He also collaborates with IT magazines to write articles about Linux and IT security. He has used Kali Linux on various occasions to conduct incident response and forensics in his professional activity, besides using it for penetration testing purposes. He is also the author of “Kali Linux Wireless Penetration Testing Essentials” published by Packt Publishing.

    •  Tajinder Kalsi with more than 9 years of working experience in the field of IT, Tajinder has conducted Seminars in Engineering Colleges all across India, on topics such as Information Security and Android Application Development at more than 120 colleges and teaching 10,000+ students. Apart from training, he has also worked on VAPT projects for various clients. When talking about certifications, Tajinder is a certified ISO 27001:2013 Auditor.

      Prior to this course, Tajinder has authored Practical Linux Security Cookbook published by Packt Publishing. He was also a Technical Reviewer with Packt, in his spare time and has reviewed the books titled - Web Application Penetration Testing with Kali Linux and Mastering Kali Linux for Advanced Penetration Testing. He is best described as dedicated, devoted, and determined and a person who strongly believes in making his dreams come true. He defines himself as a tireless worker, who loves to laugh and make others laugh.

    •  Paul Olushile is a Unix/Linux System Administrator expert with 4 years experience as a Kali Linux Penetration Tester. He's responsible for setting up and maintaining Linux servers, training and maintaining servers installed and setting up with custom builds and applications on a network; creating, deleting and modifying local user and group accounts; and troubleshooting and fixing NFS, TCP/IP and other protocols problems. He's a freelancer in Kali Linux Penetration Testing and Research, breaking into computers and networks in order to find potential security breaches, running tests, creating written reports, detailing assessment findings and recommendations, designing new tests, designing and creating new penetration tools and tests, working on improvements for security services, including continuous enhancement of existing methodology materials and supporting assets and running security audits.

    Who this course is for:

    • Novice, Intermediate students ,Digital Forensics professionals, Experienced security tester, Pentesters who are interested in learning digital forensic, securing and gaining control of their network environment with various advanced features of Kali Linux.

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Packt Publishing
    Packt Publishing
    Instructor's Courses
    Packt are an established, trusted, and innovative global technical learning publisher, founded in Birmingham, UK with over eighteen years experience delivering rich premium content from ground-breaking authors and lecturers on a wide range of emerging and established technologies for professional development.Packt’s purpose is to help technology professionals advance their knowledge and support the growth of new technologies by publishing vital user focused knowledge-based content faster than any other tech publisher, with a growing library of over 9,000 titles, in book, e-book, audio and video learning formats, our multimedia content is valued as a vital learning tool and offers exceptional support for the development of technology knowledge.We publish on topics that are at the very cutting edge of technology, helping IT professionals learn about the newest tools and frameworks in a way that suits them.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 72
    • duration 8:49:29
    • English subtitles has
    • Release Date 2023/02/20