Kali Linux is the most comprehensive distributions for pentesting and ethical hacking. It also contains popular forensics tools available to conduct professional-level forensics investigations. It also plays a very important role when it comes to securing your data or discovering loopholes within your system.
This Learning Path is an easy-to-follow, clear and concise instructions to guide you through the practical techniques and tools using Kali Linux. You’ll start with learning to perform vulnerability assessments using well-known softwares such as Nessus and OpenVas & try to exploit those vulnerabilities to show the consequences. Next you will learn about network traffic capture and analysis along with leveraging OpenVAS 9 for vulnerability scanning by finding loopholes and conquering your network environment. Finally you will learn about digital forensic which consist of how to extract and recover data, analyze the acquired data, and report and present digital evidence from a device.
Contents and Overview
This training program includes 3 complete courses, carefully chosen to give you the most comprehensive training possible.
The first course, Digital Forensics with Kali Linux covers instructions for digital imaging and forensics, and shows you hashing tools to perform successful forensic analysis with Kali Linux. It start by showing you how to use the tools (dc3dd in particular) to acquire images from the media to be analyzed, either hard drives, mobile devices, thumb drives, or memory cards. The course presents the Autopsy forensic suite and other specialized tools, such as the Sleuth Kit and RegRipper, to extract and analyze various artifacts from a Windows image. Next you’ll learn how to perform the analysis of an Android device image using Autopsy. It also teaches you file carving and recovery of deleted data, and then the process of acquiring and analyzing RAM memory (live analysis) using the Volatility framework. Finally, we demonstrate how to report and present digital evidence found during the analysis. By the end of the course, you will be able to extract and recover data, analyze the acquired data, and report and present digital evidence from a device.
The second course, Finding and Exploiting Hidden Vulnerabilities cover detailed vulnerability assessment and based on the findings try to exploit the target. This course will help you understand the understand the process of VAPT (Vulnerability Assessment and Penetration Testing) step by step. So here you’ll learn how to perform vulnerability assessments using well-known softwares such as Nessus and OpenVas. After finding the vulnerabilities, the next step for a pentester is to try to exploit those vulnerabilities to show the consequences, and nothing is better for this than Metasploit Framework. This being said you’ll also learn about many key features of Metasploit Framework and use it to exploit the vulnerabilities on the target device/machine. Finally, you’ll understand why you need to document everything done during the activity. By the end of this course, you’ll have a good understanding of the approach to follow when doing VAPT for any client.
The third course, Mastering Kali Linux network scanning covers core network scanning tasks. In this course, you’ll learn to fundamentals of utilizing Kali Linux so you can gain control over your network environment. It also focuses on core network scanning tasks such as discovery scanning, port scanning, service enumeration, operating system identification, vulnerability mapping, and validating identified findings. Next, you will also learn about network traffic capture and analysis along with leveraging OpenVAS 9 for vulnerability scanning. Lastly, this course will also teach you to create your own packages and host your own custom repositories along with securing and monitoring Kali Linux at the Network and filesystem level. By the end of this video, you will be very proficient at finding loopholes and conquering your network.
By the end of the course, you’ll have a good understanding of the approach to follow when doing VAPT for any client & also able to extract and recover data, analyze the acquired data, and report and present digital evidence from a device.
About the Authors
Marco Alamanni has professional experience working as a Linux system administrator and Information Security analyst in banks and financial institutions. He holds a BSc in Computer Science and an MSc in Information Security. His interests in information technology include ethical hacking, digital forensics, malware analysis, Linux, and programming, among other things. He also collaborates with IT magazines to write articles about Linux and IT security. He has used Kali Linux on various occasions to conduct incident response and forensics in his professional activity, besides using it for penetration testing purposes. He is also the author of “Kali Linux Wireless Penetration Testing Essentials” published by Packt Publishing. Tajinder Kalsi with more than 9 years of working experience in the field of IT, Tajinder has conducted Seminars in Engineering Colleges all across India, on topics such as Information Security and Android Application Development at more than 120 colleges and teaching 10,000+ students. Apart from training, he has also worked on VAPT projects for various clients. When talking about certifications, Tajinder is a certified ISO 27001:2013 Auditor.Prior to this course, Tajinder has authored Practical Linux Security Cookbook published by Packt Publishing. He was also a Technical Reviewer with Packt, in his spare time and has reviewed the books titled – Web Application Penetration Testing with Kali Linux and Mastering Kali Linux for Advanced Penetration Testing. He is best described as dedicated, devoted, and determined and a person who strongly believes in making his dreams come true. He defines himself as a tireless worker, who loves to laugh and make others laugh. Paul Olushile is a Unix/Linux System Administrator expert with 4 years experience as a Kali Linux Penetration Tester. He’s responsible for setting up and maintaining Linux servers, training and maintaining servers installed and setting up with custom builds and applications on a network; creating, deleting and modifying local user and group accounts; and troubleshooting and fixing NFS, TCP/IP and other protocols problems. He’s a freelancer in Kali Linux Penetration Testing and Research, breaking into computers and networks in order to find potential security breaches, running tests, creating written reports, detailing assessment findings and recommendations, designing new tests, designing and creating new penetration tools and tests, working on improvements for security services, including continuous enhancement of existing methodology materials and supporting assets and running security audits.
Who this course is for:
Novice, Intermediate students ,Digital Forensics professionals, Experienced security tester, Pentesters who are interested in learning digital forensic, securing and gaining control of their network environment with various advanced features of Kali Linux.
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/01 - Digital Forensics with Kali Linux/001 The Course Overview_en.vtt
5.3 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/01 - Digital Forensics with Kali Linux/002 Brief Introduction to Digital Forensics_en.vtt
7.7 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/01 - Digital Forensics with Kali Linux/003 Downloading and Installing Kali Linux_en.vtt
8.1 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/01 - Digital Forensics with Kali Linux/004 Introduction to Forensic Imaging_en.vtt
13.2 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/01 - Digital Forensics with Kali Linux/005 Overview of dcfldd and dc3dd_en.vtt
5.2 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/01 - Digital Forensics with Kali Linux/006 Drive Imaging with dc3dd_en.vtt
8.3 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/01 - Digital Forensics with Kali Linux/007 Android Device Imaging with dc3dd_en.vtt
11.6 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/01 - Digital Forensics with Kali Linux/008 Image Acquisition with Guymager_en.vtt
5.8 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/01 - Digital Forensics with Kali Linux/009 Overview of the Sleuth Kit and Filesystem Analysis_en.vtt
12.6 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/01 - Digital Forensics with Kali Linux/010 Windows Registry Analysis with RegRipper_en.vtt
11.3 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/01 - Digital Forensics with Kali Linux/011 Extracting and Analyzing Browser, E-mail, and IM Artifacts_en.vtt
12.9 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/01 - Digital Forensics with Kali Linux/012 File Analysis Tools_en.vtt
14.2 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/01 - Digital Forensics with Kali Linux/013 Building a Super-Timeline of the Events_en.vtt
10.7 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/01 - Digital Forensics with Kali Linux/014 File Carving Overview_en.vtt
7.8 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/01 - Digital Forensics with Kali Linux/015 File Carving Tools_en.vtt
10.2 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/01 - Digital Forensics with Kali Linux/016 Extracting Data with Bulk Extractor_en.vtt
5.3 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/01 - Digital Forensics with Kali Linux/017 Autopsy 4 Overview and Installation_en.vtt
6 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/01 - Digital Forensics with Kali Linux/018 Analysis of a Windows Image with Autopsy_en.vtt
10.9 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/01 - Digital Forensics with Kali Linux/019 Analysis of an Android Image with Autopsy_en.vtt
5.3 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/01 - Digital Forensics with Kali Linux/020 Introduction to Memory Forensics and Acquisition_en.vtt
5.4 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/01 - Digital Forensics with Kali Linux/021 Memory Acquisition_en.vtt
5.1 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/01 - Digital Forensics with Kali Linux/022 Introduction to Volatility_en.vtt
4.1 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/01 - Digital Forensics with Kali Linux/023 Memory Analysis with Volatility_en.vtt
5.1 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/01 - Digital Forensics with Kali Linux/024 Introduction to Network Forensics_en.vtt
6.3 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/01 - Digital Forensics with Kali Linux/025 Capturing Network Traffic with Wireshark_en.vtt
6.5 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/01 - Digital Forensics with Kali Linux/026 Network Traffic Analysis with Wireshark_en.vtt
4.7 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/01 - Digital Forensics with Kali Linux/027 Introduction to Reporting_en.vtt
5 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/01 - Digital Forensics with Kali Linux/028 Documentation and Reporting Tools_en.vtt
6.9 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/01 - Digital Forensics with Kali Linux/15230888-Network-Scanning-Pentesting-Digital-Forensic-with-kali-Linux.zip
404 B
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/02 - Finding and Exploiting Hidden Vulnerabilities/001 The Course Overview_en.vtt
2 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/02 - Finding and Exploiting Hidden Vulnerabilities/002 Installing Nessus Vulnerability Scanner_en.vtt
12.2 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/02 - Finding and Exploiting Hidden Vulnerabilities/003 Using Nessus_en.vtt
12.4 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/02 - Finding and Exploiting Hidden Vulnerabilities/004 Exporting Nessus Output_en.vtt
6.7 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/02 - Finding and Exploiting Hidden Vulnerabilities/005 Installing OpenVas_en.vtt
7.4 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/02 - Finding and Exploiting Hidden Vulnerabilities/006 Using OpenVas_en.vtt
7.3 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/02 - Finding and Exploiting Hidden Vulnerabilities/007 Setting up Metasploit_en.vtt
10.2 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/02 - Finding and Exploiting Hidden Vulnerabilities/008 Understanding Payloads and Exploits_en.vtt
10.2 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/02 - Finding and Exploiting Hidden Vulnerabilities/009 Importing Nessus Results_en.vtt
5.7 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/02 - Finding and Exploiting Hidden Vulnerabilities/010 Scanning with Metasploit_en.vtt
11.5 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/02 - Finding and Exploiting Hidden Vulnerabilities/011 Metasploit Interfaces_en.vtt
7.6 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/02 - Finding and Exploiting Hidden Vulnerabilities/012 Using Meterpreter_en.vtt
9 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/02 - Finding and Exploiting Hidden Vulnerabilities/013 Creating Custom Backdoors for Different Platforms_en.vtt
4.8 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/02 - Finding and Exploiting Hidden Vulnerabilities/014 Msfvenom_en.vtt
11.2 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/02 - Finding and Exploiting Hidden Vulnerabilities/015 Encoders_en.vtt
6.3 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/02 - Finding and Exploiting Hidden Vulnerabilities/016 Exploiting MS Office and PDF Documents_en.vtt
12 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/02 - Finding and Exploiting Hidden Vulnerabilities/017 Social Engineering Toolkit_en.vtt
7.2 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/02 - Finding and Exploiting Hidden Vulnerabilities/018 Recap of Scope_en.vtt
5.4 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/02 - Finding and Exploiting Hidden Vulnerabilities/019 Information Gathered_en.vtt
3.8 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/02 - Finding and Exploiting Hidden Vulnerabilities/020 Vulnerabilities Identified_en.vtt
5.1 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/02 - Finding and Exploiting Hidden Vulnerabilities/021 Exploitable Vulnerabilities_en.vtt
5.5 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/02 - Finding and Exploiting Hidden Vulnerabilities/022 Documentation_en.vtt
10.3 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/03 - Mastering Kali Linux Network Scanning/001 The Course Overview_en.vtt
5.9 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/03 - Mastering Kali Linux Network Scanning/002 Preparing Your Network Scanning Maching.mp4
111.4 MB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/03 - Mastering Kali Linux Network Scanning/002 Preparing Your Network Scanning Maching_en.vtt
9.2 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/03 - Mastering Kali Linux Network Scanning/003 Validating Network Connectivity_en.vtt
5.4 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/03 - Mastering Kali Linux Network Scanning/004 Updating Kali Software Packages.mp4
105.3 MB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/03 - Mastering Kali Linux Network Scanning/004 Updating Kali Software Packages_en.vtt
7.2 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/03 - Mastering Kali Linux Network Scanning/005 Adding a Non-Root User to Kali_en.vtt
4.6 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/03 - Mastering Kali Linux Network Scanning/006 Creating a System Inventory Using Nmap.mp4
97.3 MB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/03 - Mastering Kali Linux Network Scanning/006 Creating a System Inventory Using Nmap_en.vtt
7 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/03 - Mastering Kali Linux Network Scanning/007 Identifying Open Ports and Services on Systems_en.vtt
5 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/03 - Mastering Kali Linux Network Scanning/008 Finding and Remediating System Vulnerabilities_en.vtt
4.7 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/03 - Mastering Kali Linux Network Scanning/009 Monitoring Nmap Scans Using Verbose Logging_en.vtt
6.5 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/03 - Mastering Kali Linux Network Scanning/010 Acquiring Permission to Conduct Network Scanning_en.vtt
6.4 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/03 - Mastering Kali Linux Network Scanning/011 Finding Live Hosts on the Network.mp4
124.1 MB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/03 - Mastering Kali Linux Network Scanning/011 Finding Live Hosts on the Network_en.vtt
8.1 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/03 - Mastering Kali Linux Network Scanning/012 Specifying Port Ranges to Make Scans More Efficient_en.vtt
4.8 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/03 - Mastering Kali Linux Network Scanning/013 Nmap Output Formats.mp4
123.4 MB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/03 - Mastering Kali Linux Network Scanning/013 Nmap Output Formats_en.vtt
7.3 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/03 - Mastering Kali Linux Network Scanning/014 Using Nmap Scripts for Automating Network Scanning.mp4
171.4 MB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/03 - Mastering Kali Linux Network Scanning/014 Using Nmap Scripts for Automating Network Scanning_en.vtt
12 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/03 - Mastering Kali Linux Network Scanning/015 Sparta and Eyewitness.mp4
152.4 MB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/03 - Mastering Kali Linux Network Scanning/015 Sparta and Eyewitness_en.vtt
12.5 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/03 - Mastering Kali Linux Network Scanning/016 Installing and Running OpenVAS in Kali.mp4
108.4 MB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/03 - Mastering Kali Linux Network Scanning/016 Installing and Running OpenVAS in Kali_en.vtt
6.7 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/03 - Mastering Kali Linux Network Scanning/017 Basic Scanning with OpenVAS_en.vtt
6.6 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/03 - Mastering Kali Linux Network Scanning/018 Advanced Scanning with OpenVAS_en.vtt
7.5 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/03 - Mastering Kali Linux Network Scanning/019 Enumerating Websites.mp4
93 MB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/03 - Mastering Kali Linux Network Scanning/019 Enumerating Websites_en.vtt
8.3 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/03 - Mastering Kali Linux Network Scanning/020 Using Nikto to Find Web-Based Vulnerabilities.mp4
165.6 MB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/03 - Mastering Kali Linux Network Scanning/020 Using Nikto to Find Web-Based Vulnerabilities_en.vtt
12.1 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/03 - Mastering Kali Linux Network Scanning/021 Discovering Hidden Files and Folders.mp4
147.4 MB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/03 - Mastering Kali Linux Network Scanning/021 Discovering Hidden Files and Folders_en.vtt
16.9 KB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/03 - Mastering Kali Linux Network Scanning/022 Finding Website Vulnerabilities with Burp.mp4
163.3 MB
[TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic/03 - Mastering Kali Linux Network Scanning/022 Finding Website Vulnerabilities with Burp_en.vtt
19.4 KB
Alternative Torrents for 'Kali Linux Network Scanning Pentesting Digital Forensic'.