Oreilly - Gaining Access and Covering Your Tracks with Kali Linux - 9781788626354
Oreilly - Gaining Access and Covering Your Tracks with Kali Linux
by Sean Oriyano | Publisher: Packt Publishing | Release Date: October 2018 | ISBN: 9781788626354


Gain access to a system using a portfolio of different techniques.About This VideoA comprehensive guide teaching you how to exploit and execute items on a target.Shows how to run remote applications and explore the network around a compromised hostCovers practical tasks showcasing evidence of intrusion removal.In DetailKali Linux contains a large amount of penetration testing tools from various different niches of the security and forensics fields. The Kali Linux penetration testing platform contains a vast array of tools and utilities, from information gathering to final reporting, that enable security and IT professionals to assess the security of their systems.This course covers how to gain access to a system using a portfolio of different techniques, each designed to approach the problem from a different angle. Topics covered will be password cracking, NTP, and others. In the second portion of the course you'll be introduced to a group of techniques designed to reduce or eliminate tracks that is left behind as a result of an attack.In this course we will explore the third and fourth phases of a pentest: exploiting access and covering tracks. This course starts with gaining Remote access using netcat, HTTP tunnels, and executing commands. You will further learn how to crack passwords to gain access to a system using brute-force attacks and rainbow tables. By the end of this course, you'll have learned how to extract and remove log file information from a system.
  1. Chapter 1 : Gaining Remote Access and Covering Tracks
    • The Course Overview 00:03:31
    • Using Netcat 00:06:59
    • Finding an Opening 00:10:59
    • Transferring Files 00:10:58
    • Executing Commands with Netcat 00:13:03
  2. Chapter 2 : Tunneling
    • What Is an HTTP Tunnel? 00:04:12
    • Finding an Opening 00:04:43
    • Using an HTTP Tunnel 00:05:42
    • Executing Commands with HTTP Tunnel 00:04:48
  3. Chapter 3 : Cracking Passwords
    • Using a Brute-Force Attack 00:07:58
    • Creating Rainbow Tables 00:10:07
    • Using Rainbow Tables 00:08:52
  4. Chapter 4 : Removing Log Files
    • What Can Be Captured in a Log File? 00:06:52
    • Where Are Log Files Stored? 00:05:08
    • Motivations for Removal 00:04:39
  5. Oreilly - Gaining Access and Covering Your Tracks with Kali Linux


 TO MAC USERS: If RAR password doesn't work, use this archive program: 

RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


 TO WIN USERS: If RAR password doesn't work, use this archive program: 

Latest Winrar  and extract password protected files without error.


 Coktum   |  

Information
Members of Guests cannot leave comments.


SermonBox - Seasonal Collection

SermonBox - The Series Pack Collection

Top Rated News

  • Christmas Material
  • Laser Cut & Print Design Elements Bundle - ETSY
  • Daz3D - All Materials - SKU 37000-37999
  • Cgaxis - All Product - 2019 - All Retail! - UPDATED!!!
  • DigitalXModels Full Collections
  • Rampant Design Tools Full Collections Total: $4400
  • FilmLooks.Com Full Collection
  • All PixelSquid Product
  • The Pixel Lab Collection
  • Envato Elements Full Sources- 3200+ Files
  • Ui8.NET Full Sources
  • The History of The 20th Century
  • The Dover Collections
  • Snake Interiors Collections
  • Inspirational Collections
  • Veer Fancy Collections
  • All Ojo Images
  • All ZZVE Collections
  • All Sozaijiten Collections
  • All Image Broker Collections
  • Shuterstock Bundle Collections
  • Tattoo Collections
  • Blend Images Collections
  • Authors Tuorism Collections
  • Motion Mile - Big Bundle
  • PhotoBacks - All Product - 2018
  • Dekes Techniques - Photoshop & Illustrator Course - 1 to 673
Telegram GFXTRA Group
Udemy - Turkce Gorsel Ogrenme Setleri - Part 2
Videohive Wow Pack Series


rss