Kali Linux Course Requirements
Kali Linux Course Requirements
• All Courseware & Prep Materials Included: 10 Courseware Books, Target Virtual Machines
- Kali Linux
- Windows Server 2012 R2
- Windows 7
• All Training performed on-site during the dates of July 17 through July 21, 2017.
• Introduction to Kali
o Overview of Linux OS
o Brief history and overview of Kali Linux
o Overview of Kali tools and utilities
Hands-on exercise - Basic Linux usage: working with terminal (command line), using
utilities for file and process viewing/manipulation
Hands-on exercise – Manipulating text files on Linux command line
Hands-on exercise – Tips on tricks for efficient use of command line
• Information Gathering
o Overview of Kali Information Gathering tools
o DNS analysis
o OS fingerprinting
o SNMP analysis
o Network discovery
Hands-on exercise – Abusing DNS: using whois, dig, and dnsrecon to query DNS
servers and performing reverse lookups
Hands-on exercise – Abusing SNMP: cracking SNMP community strings and
enumerating information via SNMP
Hands-on exercise – TCP/IP for Hackers: using Wireshark to capture and examine
TCP, UDP, and ICMP packets
Hands-on exercise – Network and Host Discovery: using netdiscover, traceroute,
hping3, and nmap to identify network hosts
• Port Scanning
o Nmap overview
o Port scanning techniques
o Service identification
Hands-on exercise - Port Scanning with Nmap: performing basic TCP, UDP, ping, and
OS fingerprinting scans with Nmap
Hands-on exercise – Stealthy Scanning: using Nmap timing options, SYN, and idle
scanning techniques
Hands-on exercise – Service Identification: using telnet, netcat, and Nmap –sV scans
to identify running services
Hands-on exercise – Nmap Scripting Engine (NSE): using NSE to gather detailed
information about network hosts
• Sniffing/Spoofing/Main-in-the-Middle
o Overview of Kali Sniffing/Spoofing tools
o ARP Spoofing
o Wireshark and Dsniff
Hands-on exercise – Sniffing credentials: using arpspoof and Wireshark to perform a
Man-in-the-Middle attack and capture FTP credentials
Hands-on exercise – Capturing images: using Dsniff tools to capture images from
intercepted network traffic
• Buffer Overflow
o Concept of Buffer Overflow
o Stack and Heap overflows
• Exploit Framework/Metasploit
o Metasploit Overview
o Metasploit Modules and Payloads
o The Meterpreter Payload
o Adding Custom Exploits to Metasploit
Hands-on exercise - Exploiting Vulnerable Services: using a Metasploit exploit
module to gain access to a remote system
Hands-on exercise – Additional Payloads: using Metasploit VNC and Meterpreter
payloads on a compromised system
Hands-on exercise – Client-side Exploit DLL Hijack: compromising a system with
Metasploit’s Webdav DLL Hijacker module
• Password Attacks
o Types of Password Attacks
o Overview of Kali Password Attacks Tools
Hands-on exercise – Post-exploit Password Cracking: dumping password hashes
from a compromised system and cracking hashed passwords with John the Ripper
• DoS Attack
o DoS/DDoS Attack Definition
o Performing DoS attacks with Kali (hping3, Metasploit auxiliary modules)
• Trojan Horses
o Trojan Horse Definition and Usage
o Overview of Kali Maintaining Access Tools
o Covert Channels
Hands-on exercise – Using Ncat as a Trojan: uploading ncat to a compromised
system for maintaining access
Hands-on exercise – IDS Evasion: using SSL with ncat to evade Snort IDS
Hands-on exercise – Covert Channels: using Metasploit to create an HTTPS covert
channel tool
• Rootkits
o Rootkits Definition and Usage
o Detecting Rootkits