Section 1: What Is Ethical Hacking?: Learning Kali Linux
Section 1: What Is Ethical Hacking?: Learning Kali Linux
In this section, we will learn about the concept of ethical hacking and penetration testing. There are
certain responsibilities and legal obligations that need to be understood and they differentiate an ethical
hacker from a malicious hacker.
In this video, we will learn the different techniques involved in ethical hacking.
In this video, we will learn the differences between vulnerability assessment and penetration testing (or
ethical hacking).
In this video, we will learn about the regulations around ethical hacking.
Ethical hacking is a multi-step process from initial identification and investigation to final exploitations
and reporting. There are tools and applications for each step in Kali Linux which we will introduce
later.
In this video, we will learn how to get prepared for ethical hacking (penetration testing).
In this video, we will learn about the reconnaissance step of ethical hacking.
In this video, we will learn what scanning and enumeration is and how they help in process of ethical
hacking.
2.6 Reporting
Report items
Understand the customer expectation from reporting
In this section, you will learn how to build a test lab on a virtual environment with Kali Linux. We will use
Oracle VirtualBox, Kali Linux and a vulnerable OS. You will learn how to set up a virtual network
including all required components on a single pc or laptop.
In this video, we will learn how a hacking test lab is designed and setup on a single computer.
In this video, we will learn how to setup the IP addressing, networking and connectivity.
Section 4: Reconnaissance
The first step of ethical hacking process is reconnaissance. This is when we start gathering as much as
information we can about a target. There are different tools available on Kali Linux which can help with
this, as well as other methods which can be used online.
In this video, we will learn what passive reconnaissance is, its methods and tools.
In this video, we will learn what active reconnaissance is, its methods and tools.
4.4 Dmitry
In this video, we will learn what Dmitry is, and how it works.
4.5 Maltego
In this video, we will learn what Maltego is, and how it works.
In this section, you will learn about Nmap which is one of the biggest and most popular network and
host scanning tools. Using Nmap, there are a lot which can be done, including discovering and
identifying hosts and networks.
In this video, we will learn how to use Nmap for ICMP scanning.
In this video, we will learn how to use Nmap for TCP scanning.
In this video, we will learn how to perform special TCP scans using Nmap.
In this video, we will learn how to use Nmap for UDP scans.
In this section, we continue with Nmap capabilities and teach you methods to avoid being detected by
firewalls and IPS when using Nmap. Script engine is one of the most powerful parts of Nmap which can
be used to perform special tasks and assessments. We will also learn how to use hping3 which is another
scanning tool available on Kali.
OS Detection
Avoid Detection
Nmap – Scripts and Script Engine
Nmap Troubleshooting
hping3
6.1 OS Detection
In this video, we will learn how Nmap can detect operating systems.
In this video, we will learn how to avoid detection by IDS/IPS when scanning.
In this video, we will learn what Nmap scripts are and how to use them.
In this video, we will learn how to troubleshoot and debug using Nmap.
6.5 hping3
Once all the initial tests and scans are done, and we know about hosts, services and possibilities, it is
time to take action and start the penetration process. In this section, we will discuss some useful tools
on Kali to perform vulnerability testing and exploitation. Keep in mind, the steps you will learn on this
chapter are intrusive and can be illegal if it is done without permission.
Nikto
Sparta
Ettercap
Metasploit
Armitage
7.1 Nikto
7.2 Sparta
7.3 Ettercap
7.4 Metasploit
In this video, we will understand how Metasploit is used for penetration attacks.
7.5 Armitage
Exploitation is the most difficult and challenging part of penetration testing. There are a lot of different
techniques that could be used for exploitation. We learnt about Metasploit and using vulnerabilities in
the previous section. In this section we will learn about social engineering attempts and backdoor
techniques.
In this video, we will see how spear phishing attacks are done using social engineering toolkit.
In this video, we will see how credential harvesting is done using social engineering toolkit.
8.3 Netcat
In this video, we will see what Netcat is and how it works.
In this video, we will look at password cracking with John the Ripper.