Penetration Testing: Python and Kali Linux Training Course

Course Code

pykali

Duration

14 hours (usually 2 days including breaks)

Requirements

  • An understanding of network vulnerabilities

Audience

  • Penetration Testers
  • Security Engineers
  • Ethical Hackers

Overview

Kali Linux is a Linux distribution created for digital forensics and penetration testing. With Python, users can develop penetration testing programs in Kali Linux.

This instructor-led, live training (online or onsite) is aimed at penetration testers, security engineers, and ethical hackers who wish to penetrate test networks in Kali Linux using Python.

By the end of this training, participants will be able to:

  • Create Python programs to seek network vulnerabilities.
  • Explore and use Kali web shells and shellcode in exploits.
  • Apply various Kali tools for penetration testing.
  • Exploit systems with Python code.

Format of the Course

  • Interactive lecture and discussion.
  • Lots of exercises and practice.
  • Hands-on implementation in a live-lab environment.

Course Customization Options

  • To request a customized training for this course, please contact us to arrange.

Course Outline

Introduction

Python in Depth

  • Strings and expressions
  • Functions and conditionals
  • Variables and lists

Penetration Testing

  • What is penetration testing?
  • The five phases of penetration testing

Overview of Kali Linux

  • Kali deployments
  • Exploit methods
  • The Kali menu and toolbox

Preparing the Development Environment

  • Installing a virtual machine
  • Installing and configuring Kali Linux
  • Installing and configuring Python Kali Linux
  • Setting up a Box Lab

System Shells

  • Using Weevely
  • Generating shellcode with MSFvenom
  • Injecting images with jhead
  • Using shellcode in exploits

Python and Kali Linux

  • Creating a penetration program with Python
  • Working with TCP Client and TCP Service
  • Using raw binary packets
  • Port scanning with NMAP

Mapping

  • Applying sniffing methods
  • Using SQL injection: offensive and defensive
  • Implementing brute force methods

Metasploitable

  • Targeting Metasploitable
  • Exploiting the distribute compile system
  • Exploiting network files
  • Achieving root

End-to-End Testing

  • Exploiting with EternalBlue
  • Using Devel exploits
  • Using Kronos exploits

Summary and Conclusion

Testimonials

★★★★★
★★★★★

Related Categories

Related Courses

Course Discounts

Course Discounts Newsletter

We respect the privacy of your email address. We will not pass on or sell your address to others.
You can always change your preferences or unsubscribe completely.

Some of our clients

This site in other countries/regions