Have you ever wondered how to test web applications’ security? Managing Windows security has always been a challenge for any security professional. As Windows is the most popular operating system in the corporate environment, this course will help you detect and tackle attacks early to save your data and money. Kali Linux is rated as the #1 security operating system for hackers. Kali Linux offers a multitude of options to scan a single IP, port, or host (or a range of IPs, ports, and hosts) and discover vulnerabilities and security holes. The output and the information this provides can serve as a precursor to penetration testing efforts.
Have you ever wondered how to test web applications’ security? Managing Windows security has always been a challenge for any security professional. As Windows is the most popular operating system in the corporate environment, this course will help you detect and tackle attacks early to save your data and money. Kali Linux is rated as the #1 security operating system for hackers. Kali Linux offers a multitude of options to scan a single IP, port, or host (or a range of IPs, ports, and hosts) and discover vulnerabilities and security holes. The output and the information this provides can serve as a precursor to penetration testing efforts.
This Learning Path takes a practical approach with step-by-step recipes to conduct effective penetration testing using the powerful Kali Linux. At the very beginning, you’ll develop your skills using attacks such as wireless cracking, Man-in-the-Middle, and Denial of Service (DOS). Also, explore tools such as Metasploit, Wireshark, Nmap, and much more to detect vulnerabilities with ease. Finally, you’ll master all phases in a typical penetration testing project focusing on relevant Windows tools and techniques.
By the end of the course, you’ll be one step ahead of hackers by discovering and patching your network vulnerabilities as well as performing professional-level web penetration testing.
Contents and Overview
This training program includes 4 complete courses, carefully chosen to give you the most comprehensive training possible.
The first course, Learning Network Penetration Testing with Kali Linux, covers discovering and patching your network vulnerabilities. Learn how to test your network against various types of attacks. We will teach viewers how to install Kali Linux, discuss different phases of pen testing, etc. By the end of this section, you will become familiar with the tools that Kali Linux offers to perform network penetration testing, how to exploit the vulnerable systems and how to patch them.
The second course, Kali Linux Penetration Testing Recipes, covers End-to-End penetration testing solutions. This course covers several great resources within Kali Linux and you'll use them to perform a full website and server vulnerability test, brute-force your way past passwords, search for back-doors, and other tasks. Finally, you'll create a professional report and hand it to your client.
The third course, Hands-On Web Penetration Testing with Kali Linux, covers testing web security with Kali Linux. Have you ever wondered how to test web applications security? This course will teach you about web application vulnerabilities and how to use Kali Linux tools to perform web penetration testing to professional standards. You will start with application security and learn about the process of web penetration testing. Then you'll create a test lab with Oracle VirtualBox and Kali Linux. Next, you'll learn about common vulnerabilities in web applications with practical examples, which will help you understand the process of penetration testing and the importance of security. Now you'll be introduced to different tools to assess and analyze web application vulnerabilities. In the end, you'll learn to secure web applications. By the end of the course, you'll be able to perform web penetration testing using Kali Linux.
The fourth course, Practical Windows Penetration Testing, covers Attacking & securing Windows systems with Metasploit and Kali Linux. This course will follow a typical penetration test scenario throughout. At each stage, you will be shown all the necessary tools and techniques, and how they are applied. The whole course is hands-on to guarantee that you gain practical knowledge. You will start by setting up the environment and learn service identification and network scanning techniques. You will master various exploitation and post exploitation techniques. You will also learn to proxy traffic and implement the most famous hacking technique: the pass-the-hash attack. By the end of this video tutorial, you will be able to successfully identify and tackle the flaws and vulnerabilities within the Windows OS (versions 7, 8.1, 10) using Metasploit and Kali Linux tools.
By the end of the course, you’ll conquer the world of PyTorch to build useful and effective Deep Learning models with the PyTorch Deep Learning framework.
About the Authors
Cristian Gradisteanu started as an enthusiastic pen tester a few years ago and then used his skills to work as a security consultant. He is a professionalized Ethical hacker& software developer. About Kali Linux, he uses Kali Linux frequently and is very passionate about systems and network security. The other technologies that interest Cristian are Java development, Machine learning, Cloud Computing. Web development, mobile applications development, home automation systems, SEO are the other technical skills he posses.
Aubrey Love was born and raised in Texas USA, he has achieved several certifications for programming in various languages. He has designed and developed custom websites, set up servers, and secured websites and servers using Nginx/Apache, Fail2Ban, and other Utilities. Working with companies of all shapes and sizes, using WordPress and Custom Sites, it is a fun and fascinating world out there for a programmer. He serves as a freelance programmer by day, and an Author by night. Rassoul Ghaznavi Zadeh is an information security architect. He has worked with business to define frameworks, perform risk and gap analysis, and identify security controls and roadmaps. He also works with stakeholders to plan, organize, and manage the successful delivery of security strategies and projects as well as the stable operation of the organization's IT infrastructure security, integration, and optimization. His key skills are:
Enterprise security architecture design and business alignment Risk assessment, management, compliance, and auditing Evaluating and analyzing IT security technologies and solutions Monitoring and measuring the effectiveness of IT security controls Vulnerability assessment and penetration testing
Gergely Révay, the instructor of this course, hacks stuff for fun and profit at Multinational Corporation in Germany and in the USA. He has worked as a penetration tester since 2011; before that, he was a quality assurance engineer in his home country, Hungary. As a consultant, he did penetration tests and security assessments in various industries, such as insurance, banking, telco, mobility, healthcare, industrial control systems, and even car production.
Gergely has also built online courses and tutorials since 2014 on various platforms. During this time he has put a lot of effort into understanding how pentesting and offensive security can be taught efficiently.
This video provides an overview of the entire course.
This video aims to introduce you to Kali Linux.
Discover what Kali Linux is
Know the reasons for its popularity
Also, know who are the typical users of Kali Linux
This video discusses the required hardware and software that will allow us to install and run Kali Linux.
Know the required hardware and software
Also, know the recommendations for running Kali Linux
Installing Kali Linux in a virtual environment.
Achieve a virtual environment using VirtualBox
Install VirtualBox
Install Kali Linux in VirtualBox
This video shows how to install Kali Linux on a Raspberry Pi device.
Prepare Raspberry Pi for installation by gathering the required accessories
Download and write the Kali Linux image on the micro-SD card
Insert the micro-SD card into Raspberry Pi and run Kali Linux for the first time
This video gives a brief introduction to the Kali Linux interface and tools.
Discuss the main user interface elements
Take a quick look at some of the most common tools that Kali Linux offers
Keeping Kali Linux up to date.
Update the list of available packages using apt-get update
Update the actual packages by running apt-get upgrade
Update all the available packages (system update) using apt-get dist-upgrade
Some of the networking fundamentals and terms that we are going to use throughout this course.
Discover the IP address allocated to our virtual machine
Test for Internet connectivity
Test for connectivity with our host operating system
Why is it important to have a pen-testing lab environment?
Get to know what a pen-testing lab is
Know what are the tools used to create a pen-testing lab
In this video, we will discuss what penetration testing is and why you might want to learn it.
Know what pen-testing is
Understand why learn pen-testing
This video represents a short introduction to the first phase of pen-testingóreconnaissance.
Know what reconnaissance is
Understand why reconnaissance is so important
What is vulnerability scanning?
View a short discussion about the second phase of pen-testing: vulnerability scanning
Third phase of pen-testingógaining and maintaining access.
View a short discussion about the third phase of pen-testingView a short discussion about the third phase of pen-testing
Last phase of a hacking attackócovering tracks.
Get to know the tools that Kali Linux offers to cover your tracks after a successful exploitation
Obtain passive information about our target.
Using publicly available tools to gather passive information about our target
Use the Maltego utility to perform passive reconnaissance
It is time to perform some active reconnaissance.
Use nmap to discover the open ports found on our target machine; this will be part of our active reconnaissance process
Using Kali Linux tools, we try to discover the open ports available in our target machine.
Use nmap to detect the open ports
Discover the services that are running on our target machine and its operating system.
Use nmap to uncover the running services
Use nmap to identify the operating system
Discovering vulnerabilities in our target system using the OpenVAS vulnerability scanner.
Install OpenVAS in Kali Linux
Use OpenVAS to determine vulnerable services that are running on our target machine
Discover the services that are vulnerable on our target system using the Nessus scanner.
Install Nessus in Kali Linux
Use Nessus to scan our target system against common vulnerabilities
Time to exploit the vulnerabilities found on our target system.
Use the Metasploit framework to exploit the vsftpd server
We copied the system passwords from the target machine to our Kali Linux machine. Now itís time to crack those passwords.
Use John to crack the system passwords
Discussion about the post-exploitation phase.
We've been able to crack the system passwords and login with a valid username and password. Now what
What can a system administrator do against these hacking attacks?
Discussion about how the security of your network can be improved
This video will give you an overview about the course.
So we don’t have a spare computer laying around to install this amazing OS on, not a problem. We are going to be looking into installing a VirtualBox to help us setup a virtual desktop on our computer.
Install VirtualBox
Create a new virtual computer
We will now download Kali Linux and install that OS on our virtual machine we had setup. Once we have Kali installed on our virtual computer, we will take a look at it and get ourselves accustomed to this operating system.
Download and Install Kali Linux
Play around with Kali Linux
In this video, you will learn about the Penetration testing and will show you how to get started using Kali Linux.
Update the Kali
Explore the terminal
View the browser and looking at the menu
While we are performing our password attacks, we are going to be needing a password text file. Instead of utilizing the default password text file during our testing, we will create our own dictionary of passwords we can use.
Create a password dictionary
Does your target run WordPress? If so we can easily take advantage of different.
Exploit Usernames associated with our target
Crack passwords of the usernames we extracted from our target
Log into the WordPress website using the correct credentials we collected
So we have been challenged with a web-based application and need to test it for vulnerabilities. Not a problem. This section we will learn how to exploit that web app using Burp Suite.
Web-Based application testing with Burp Suite
With that web-based application, we will discover how to scan that web app to see if there are any penetration marks that we can use to work our way into any possible back-doors, and other information that we can use to attack our target.
Pen Testing with XSSER to find vulnerabilities
While scanning the website is one task that everyone usually tends to go for, I personally will be showing you my favourite task, viewing the websites source code. We can either download the website directly to our computer, or external storage device, or view it live.
View the source code offline
View the source code live
Throwing testing packages and viewing the source code is a great place to start, we will need to check to see if that web-based application has any open and weak ports that we can use.
Utilize Wireshark to help us with port snooping
While extracting all of this useful information is a great practice, we will need to learn more about who we are dealing with. This can be for a personal reason, or maybe we have been asked to learn all we can about the website owner.
Use an online service, MXToolBox to help us extract information from our target
One of the easiest methods to do is test our targeted server for any SQL Injection vulnerabilities. This will allow us to throw SQL Injections to the server for a variety of things.
Test server with SQLMap for vulnerabilities
Search vulnerabilities using SQLNinja
Sometimes our servers are vulnerable to JSP Shell attacks, and if our targeted server is indeed vulnerable to JSP Shell, we should test and document it for future reference.
Utilize JBoss-AutoPWN to test for vulnerabilities
Assuming that our target has open ports for SSH, FTP, or other types of remote connection, we can attempt to brute force our way past the login credentials to gain access to the server.
Brute forcing passwords using Cain and Abel
Test Passwords with John the Ripper
In this video, you will learn how to use the PunkSPIDER.
Find security measures and weaknesses
Highlight every single option available in PunkSPIDER
This is extremely important as there are numerous programs that are target could be running. If there is an outdated software, we can view the reports on that specific version to see if there are any vulnerabilities.
Scan for outdated software using Nikto
This is an attack in which a host with no authority is directing a domain name server and all of the requests. This allows a hacker to redirect all of the DNS requests, thus the traffic as well, to another machine.
Manipulate DNS Traffic By using Ettercap
Reconnaissance is a crucial part of our ethical hacking pen testing. Recon is the process of gathering all of the required information needed in order to determine the best strategy for hacking our target.
Perform a Recon using Sparta
Utilizing a Social Engineering Toolkit (SET), we can create a false login page and have the credentials stored onto our designated location. This allows us to steal login details of users.
Create a login page using SET
Deploy Virtual Server
Send Login page to victim
One of the hardest methods of SEA is gaining access to the physical location. Sometimes our clients will ask us to gain physical access to a section of a building. This can be accomplished, if you have proper people skills and can read people.
Learn to read people
Figure the best method to talk to someone
Gain access to the building
We have seen on countless hacking movies that the hacker will call the target to extract some type of information. And still to this day, that method is frequently used. We will talk about how to carry out this SEA.
Discover which person and sector to talk to
While many people don’t realize this, but email is one of the greatest methods of extracting information about a company. An email contains the IP Address and the MX directory of the companies email provider. Plus we can use this method to service our SET section.
View IP Address from email
In this video, you will learn about the Harvester: Social Gathering.
Find the target
Exploit the target by means of emails
Extract the data directly from Kali Linux
If you are inside of a company, chances are they have their own hidden wireless network. If they do, that is our golden ticket! We will learn how to view those hidden networks, and then crack their passwords.
Search for those hidden SSID’s using ArioDump
So we have a SSID we can connect too, now what? This section we will learn how to hack those wireless passwords using a few different techniques. We will be using our created PWD List for this.
Explore the password hacking
Look into the brute forcing application Air-crack
Use ‘pwd.txt’ dictionary
In this video, you will learn about the John the ripper
Explore alternate way of brute forcing
Pass through dictionaries
While connected to our network, we need to do something instead of Google or Facebook. We are going to learn how to intercept incoming and outgoing traffic on our connected network.
Use Wireshark to intercept and read incoming/outgoing traffic
We have a domain name to test, not an IP. How can we extract the IP information? We will be utilizing the PING command in order to pull that information. Then we will perform an NS Look Up test to find out more information.
Ping domain name to get IP Address of target
Utilize NS Lookup to extract information about our target
This is a two part section. We will first dive into the IP WhoIS report, and then follow up with the domain name WhoIs. This is helpful to see if the domain admin is the same as the server admin, and we can extract other forms of information using these techniques.
Search IP Address WhoIS
Search Domain Name WhoIS
Often overlooked, but we will be looking at the websites background. Much like your background report, we will need to see what all the creators have done to the website, and when they did it.
Perform a background history report using Netcraft
Another overlooked aspect, is searching for email accounts and social media accounts. This will be helpful as we can get an insight to who works there, and helps us with our SEA.
Learn how to use the Harvester
While performing a Recon, typically our motions are visible to the website, or servers, admins. In this section, we will learn how to perform a stealthy approach by using a protected network.
Protect network using VPN
Perform a Stealth Recon using Nmap
Much like we showed on our wireless intercepting, we will be looking at incoming and outgoing connections for the targeted website.
Learn how to intercept website traffic using Wireshark
Now that we have performed our hacks and attacks, we need to generate a report to present to our employer. This should give them some details about your exploits, how you did them, and options on how to fix them.
Design the report and adding proper content
This video will give you an overview about the course.
In this video, we will discuss the concerns with web applications.
Look at the web application specifications
Understand the risks associated with web applications
Understand the penetration testing process
In this video, we will discuss the common vulnerabilities of a web application.
Learn what OWASP is
Look at the OWASP Top 10 vulnerabilities
Get a summary of the vulnerabilities
In this video, we will look at the differences between vulnerability assessment and penetration testing (or ethical hacking).
Understand vulnerabilities, threats, and risks
Understand vulnerability assessment and the challenges involved in it
Understand the difference between penetration testing and vulnerability assessment
In this video, we will understand the challenges and expectations of ethical hacking.
Understand the responsibilities of an ethical hacker
Understand the customer goals and expectations
Look at the challenges and limitations
In this video, we will learn the requirements for building a hacking test lab.
Look at the standard laptop/computer requirements
Understand the software installation requirements
Understand the virtual images requirements
In this video, we will learn how a hacking test lab is designed and set up on a single computer.
Understand the diagram and design
Understand IP addressing and networking
Look at the VirtualBox settings and configuration
In this video, we will see how to set up IP addressing, networking, and connectivity.
Understand IP address configuration on Kali Linux
Understand IP address configuration on DVWA
Test connectivity and DVWA web access
In this video, we will learn how to use the DVWA web interface.
Input your login information
Perform setup/reset operations
Understand the security settings
In this video, we will learn three types of attacks.
Understand what brute force is
Understand what CSRF is
Understand what file inclusion is
In this video, we will learn what SQL injection is and how it works.
Understand what an SQL injection attack is
Perform SQL injection tests on DVWA
Learn how to protect yourself against SQL injection
In this video, we will learn what XSS is and how it works.
Understand what an XSS attack is
Perform XSS tests on DVWA
Learn how to protect yourself against XSS
In this video, we will learn what command execution is and how it works.
Understand how a command execution attack works
Perform a command execution attack on DVWA
Take control over the server
In this video, we will learn how to use OWASP-ZAP.
Change the DVWA security level
Understand the basics of OWASP-ZAP
Perform OWASP-ZAP scans
In this video, we will learn how to scan authenticated websites.
Learn the OWASP-ZAP modes
Understand the challenges with authenticated websites
Perform OWASP-ZAP authenticated scans
In this video, we will learn what Burp Suite is and how to use it.
Understand Burp Proxy
Understand Burp Spider
Understand Burp Scanner
In this video, we will dive deeper into Burp Suite.
Understand Burp Intruder
Perform brute-force attacks
Understand Burp Repeater
In this video, we will learn considerations for web application development security.
Understand risk analysis
Look at the vulnerability categories
Understand the remediations
In this video, we will learn about web application firewalls.
Understand how a WAF works
Compare WAF to Firewalls and IPS
Learn about WAF vendors and demonstration
In this video, we will learn about mod_security installation and configuration.
Understand what mod_security is
Install mod_security
Configure mod_security
Hacking is a legal gray zone, thus students need to understand that due diligence has to be practiced.
Understand what ethical means
Warn students that they need to understand the laws of their country
This course is for educational purposes only
We need a windows environment where all exercises in the course can be executed.
Understand the architecture of the network
Understand how the three machines relate to each other
Get ready to install the test machines
Kali Linux is used as the attacker’s machine. It needs to be installed.
Download Kali
Download Virtual box
Import Kali to Virtual box
Most of the attacks will be done against a Windows 10 machine that symbolizes a standard enterprise workstation. It has to be configured carefully so that all exercises could be run.
Download the evaluation version of Windows 10
Create a new virtual machine and install Windows 10
Do additional configuration
Enterprise environments usually run Windows Servers. In our test network it will be a Windows 2016 that will act as the domain controller as well.
Download the evaluation version of Windows Server 2016
Create a new virtual machine and install Windows Server 2016
Save the virtual machine
The Windows machine should connect to an internal network that also runs an Active Directory Domain.
Turn the Windows 2016 to a domain controller
Join the new domain with the Windows 10
Create dummy service on the Windows 10
To define the attack surface, we would like to know as much about the target network as possible.
Identify all running hosts on the network
Identify all open TCP ports
Identify all running UDP port
To be able to exploit services we need to know exactly what they are.
Find out what kind of service is running on a port
Identify the program that is running the service
Identify the exact version of the program
Exploit development is very time consuming and complex. In most penetration tests publicly available exploits are used.
Find a suitable exploit on the Internet
Understand and modify the exploit as necessary
Run the exploit and get access to the machine
A more extensive framework is needed to efficiently do testing. The Metasploit Framework offers various tools that will be used in every stage of a pentest.
Find suitable exploit in Metasploit
Choose payload for the exploit
Run the exploit
Although not real exploitation but lot of real attacks rely on files that are that are executed by a victim user after a social engineering attack.
Choose a payload that should be executed by the victim
Create a malicious executable with the payload
Social engineer the target user to run you executable
Modern Anti-Virus programs such as Windows Defender can detect a wide variety of malicious actions. Evading these tools is a typical cat-and-mouse game.
Choose a legitimate Windows executable that will be used to carry the payload
Download and run shelter to inject the malicious payload into the executable
Run a handler to receive the connect back shell
We learnt a lot in this section and it should be practiced.
Review what we learnt
Explain how exploitation can be practiced
Practice the given steps
We need to understand where we in the penetration test are and what are the at this point.
Understand what the post-exploitation phase is about
Usable and stable backdoor is needed to properly interact with the exploited machine.
Create a meterpreter payload
Execute a payload handler
Get to know the meterpreter shell
OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.
Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.
Find this site helpful? Tell a friend about us.
We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.
Your purchases help us maintain our catalog and keep our servers humming without ads.
Thank you for supporting OpenCourser.