Penetration Testing: Python and Kali Linux Training Course

Course Code

pykali

Duration

14 hours (usually 2 days including breaks)

Requirements

  • An understanding of network vulnerabilities

Audience

  • Penetration Testers
  • Security Engineers
  • Ethical Hackers

Overview

Kali Linux is a Linux distribution created for digital forensics and penetration testing. With Python, users can develop penetration testing programs in Kali Linux.

This instructor-led, live training (online or onsite) is aimed at penetration testers, security engineers, and ethical hackers who wish to penetrate test networks in Kali Linux using Python.

By the end of this training, participants will be able to:

  • Create Python programs to seek network vulnerabilities.
  • Explore and use Kali web shells and shellcode in exploits.
  • Apply various Kali tools for penetration testing.
  • Exploit systems with Python code.

Format of the Course

  • Interactive lecture and discussion.
  • Lots of exercises and practice.
  • Hands-on implementation in a live-lab environment.

Course Customization Options

  • To request a customized training for this course, please contact us to arrange.

Course Outline

Introduction

Python in Depth

  • Strings and expressions
  • Functions and conditionals
  • Variables and lists

Penetration Testing

  • What is penetration testing?
  • The five phases of penetration testing

Overview of Kali Linux

  • Kali deployments
  • Exploit methods
  • The Kali menu and toolbox

Preparing the Development Environment

  • Installing a virtual machine
  • Installing and configuring Kali Linux
  • Installing and configuring Python Kali Linux
  • Setting up a Box Lab

System Shells

  • Using Weevely
  • Generating shellcode with MSFvenom
  • Injecting images with jhead
  • Using shellcode in exploits

Python and Kali Linux

  • Creating a penetration program with Python
  • Working with TCP Client and TCP Service
  • Using raw binary packets
  • Port scanning with NMAP

Mapping

  • Applying sniffing methods
  • Using SQL injection: offensive and defensive
  • Implementing brute force methods

Metasploitable

  • Targeting Metasploitable
  • Exploiting the distribute compile system
  • Exploiting network files
  • Achieving root

End-to-End Testing

  • Exploiting with EternalBlue
  • Using Devel exploits
  • Using Kronos exploits

Summary and Conclusion

Testimonials

★★★★★
★★★★★

Related Categories

Related Courses

Course Discounts

Course Discounts Newsletter

We respect the privacy of your email address. We will not pass on or sell your address to others.
You can always change your preferences or unsubscribe completely.

Some of our clients

is growing fast!

We are looking for a good mixture of IT and soft skills in Luxembourg!

As a NobleProg Trainer you will be responsible for:

  • delivering training and consultancy Worldwide
  • preparing training materials
  • creating new courses outlines
  • delivering consultancy
  • quality management

At the moment we are focusing on the following areas:

  • Statistic, Forecasting, Big Data Analysis, Data Mining, Evolution Alogrithm, Natural Language Processing, Machine Learning (recommender system, neural networks .etc...)
  • SOA, BPM, BPMN
  • Hibernate/Spring, Scala, Spark, jBPM, Drools
  • R, Python
  • Mobile Development (iOS, Android)
  • LAMP, Drupal, Mediawiki, Symfony, MEAN, jQuery
  • You need to have patience and ability to explain to non-technical people

To apply, please create your trainer-profile by going to the link below:

Apply now!

This site in other countries/regions