Kali Linux: Network Scanning, Pentesting & Digital Forensic
- CategoryOther
- TypeTutorials
- LanguageEnglish
- Total size4.1 GB
- Uploaded Bytutsnode
- Downloads296
- Last checkedJan. 05th '22
- Date uploadedJan. 03rd '22
- Seeders 48
- Leechers26
Description
Kali Linux is the most comprehensive distributions for pentesting and ethical hacking. It also contains popular forensics tools available to conduct professional-level forensics investigations. It also plays a very important role when it comes to securing your data or discovering loopholes within your system.
This Learning Path is an easy-to-follow, clear and concise instructions to guide you through the practical techniques and tools using Kali Linux. You’ll start with learning to perform vulnerability assessments using well-known softwares such as Nessus and OpenVas & try to exploit those vulnerabilities to show the consequences. Next you will learn about network traffic capture and analysis along with leveraging OpenVAS 9 for vulnerability scanning by finding loopholes and conquering your network environment. Finally you will learn about digital forensic which consist of how to extract and recover data, analyze the acquired data, and report and present digital evidence from a device.
Contents and Overview
This training program includes 3 complete courses, carefully chosen to give you the most comprehensive training possible.
The first course, Digital Forensics with Kali Linux covers instructions for digital imaging and forensics, and shows you hashing tools to perform successful forensic analysis with Kali Linux. It start by showing you how to use the tools (dc3dd in particular) to acquire images from the media to be analyzed, either hard drives, mobile devices, thumb drives, or memory cards. The course presents the Autopsy forensic suite and other specialized tools, such as the Sleuth Kit and RegRipper, to extract and analyze various artifacts from a Windows image. Next you’ll learn how to perform the analysis of an Android device image using Autopsy. It also teaches you file carving and recovery of deleted data, and then the process of acquiring and analyzing RAM memory (live analysis) using the Volatility framework. Finally, we demonstrate how to report and present digital evidence found during the analysis. By the end of the course, you will be able to extract and recover data, analyze the acquired data, and report and present digital evidence from a device.
The second course, Finding and Exploiting Hidden Vulnerabilities cover detailed vulnerability assessment and based on the findings try to exploit the target. This course will help you understand the understand the process of VAPT (Vulnerability Assessment and Penetration Testing) step by step. So here you’ll learn how to perform vulnerability assessments using well-known softwares such as Nessus and OpenVas. After finding the vulnerabilities, the next step for a pentester is to try to exploit those vulnerabilities to show the consequences, and nothing is better for this than Metasploit Framework. This being said you’ll also learn about many key features of Metasploit Framework and use it to exploit the vulnerabilities on the target device/machine. Finally, you’ll understand why you need to document everything done during the activity. By the end of this course, you’ll have a good understanding of the approach to follow when doing VAPT for any client.
The third course, Mastering Kali Linux network scanning covers core network scanning tasks. In this course, you’ll learn to fundamentals of utilizing Kali Linux so you can gain control over your network environment. It also focuses on core network scanning tasks such as discovery scanning, port scanning, service enumeration, operating system identification, vulnerability mapping, and validating identified findings. Next, you will also learn about network traffic capture and analysis along with leveraging OpenVAS 9 for vulnerability scanning. Lastly, this course will also teach you to create your own packages and host your own custom repositories along with securing and monitoring Kali Linux at the Network and filesystem level. By the end of this video, you will be very proficient at finding loopholes and conquering your network.
By the end of the course, you’ll have a good understanding of the approach to follow when doing VAPT for any client & also able to extract and recover data, analyze the acquired data, and report and present digital evidence from a device.
About the Authors
Marco Alamanni has professional experience working as a Linux system administrator and Information Security analyst in banks and financial institutions. He holds a BSc in Computer Science and an MSc in Information Security. His interests in information technology include ethical hacking, digital forensics, malware analysis, Linux, and programming, among other things. He also collaborates with IT magazines to write articles about Linux and IT security. He has used Kali Linux on various occasions to conduct incident response and forensics in his professional activity, besides using it for penetration testing purposes. He is also the author of “Kali Linux Wireless Penetration Testing Essentials” published by Packt Publishing.
Tajinder Kalsi with more than 9 years of working experience in the field of IT, Tajinder has conducted Seminars in Engineering Colleges all across India, on topics such as Information Security and Android Application Development at more than 120 colleges and teaching 10,000+ students. Apart from training, he has also worked on VAPT projects for various clients. When talking about certifications, Tajinder is a certified ISO 27001:2013 Auditor.Prior to this course, Tajinder has authored Practical Linux Security Cookbook published by Packt Publishing. He was also a Technical Reviewer with Packt, in his spare time and has reviewed the books titled – Web Application Penetration Testing with Kali Linux and Mastering Kali Linux for Advanced Penetration Testing. He is best described as dedicated, devoted, and determined and a person who strongly believes in making his dreams come true. He defines himself as a tireless worker, who loves to laugh and make others laugh.
Paul Olushile is a Unix/Linux System Administrator expert with 4 years experience as a Kali Linux Penetration Tester. He’s responsible for setting up and maintaining Linux servers, training and maintaining servers installed and setting up with custom builds and applications on a network; creating, deleting and modifying local user and group accounts; and troubleshooting and fixing NFS, TCP/IP and other protocols problems. He’s a freelancer in Kali Linux Penetration Testing and Research, breaking into computers and networks in order to find potential security breaches, running tests, creating written reports, detailing assessment findings and recommendations, designing new tests, designing and creating new penetration tools and tests, working on improvements for security services, including continuous enhancement of existing methodology materials and supporting assets and running security audits.
Who this course is for:
Novice, Intermediate students ,Digital Forensics professionals, Experienced security tester, Pentesters who are interested in learning digital forensic, securing and gaining control of their network environment with various advanced features of Kali Linux.
Requirements
Basic knowledge of Kali Linux is assumed.
Last Updated 11/2018
Files:
Kali Linux Network Scanning, Pentesting & Digital Forensic [TutsNode.com] - Kali Linux Network Scanning, Pentesting & Digital Forensic 03 - Mastering Kali Linux Network Scanning- 014 Using Nmap Scripts for Automating Network Scanning.mp4 (171.4 MB)
- 022 Finding Website Vulnerabilities with Burp_en.vtt (19.4 KB)
- 021 Discovering Hidden Files and Folders_en.vtt (16.9 KB)
- 015 Sparta and Eyewitness_en.vtt (12.5 KB)
- 020 Using Nikto to Find Web-Based Vulnerabilities_en.vtt (12.1 KB)
- 014 Using Nmap Scripts for Automating Network Scanning_en.vtt (12.0 KB)
- 002 Preparing Your Network Scanning Maching_en.vtt (9.2 KB)
- 019 Enumerating Websites_en.vtt (8.3 KB)
- 011 Finding Live Hosts on the Network_en.vtt (8.1 KB)
- 018 Advanced Scanning with OpenVAS_en.vtt (7.5 KB)
- 013 Nmap Output Formats_en.vtt (7.3 KB)
- 004 Updating Kali Software Packages_en.vtt (7.2 KB)
- 006 Creating a System Inventory Using Nmap_en.vtt (7.0 KB)
- 016 Installing and Running OpenVAS in Kali_en.vtt (6.7 KB)
- 017 Basic Scanning with OpenVAS_en.vtt (6.6 KB)
- 009 Monitoring Nmap Scans Using Verbose Logging_en.vtt (6.5 KB)
- 010 Acquiring Permission to Conduct Network Scanning_en.vtt (6.4 KB)
- 001 The Course Overview_en.vtt (5.9 KB)
- 003 Validating Network Connectivity_en.vtt (5.4 KB)
- 007 Identifying Open Ports and Services on Systems_en.vtt (5.0 KB)
- 012 Specifying Port Ranges to Make Scans More Efficient_en.vtt (4.8 KB)
- 008 Finding and Remediating System Vulnerabilities_en.vtt (4.7 KB)
- 005 Adding a Non-Root User to Kali_en.vtt (4.6 KB)
- 020 Using Nikto to Find Web-Based Vulnerabilities.mp4 (165.6 MB)
- 022 Finding Website Vulnerabilities with Burp.mp4 (163.3 MB)
- 015 Sparta and Eyewitness.mp4 (152.4 MB)
- 021 Discovering Hidden Files and Folders.mp4 (147.4 MB)
- 011 Finding Live Hosts on the Network.mp4 (124.1 MB)
- 013 Nmap Output Formats.mp4 (123.4 MB)
- 002 Preparing Your Network Scanning Maching.mp4 (111.4 MB)
- 016 Installing and Running OpenVAS in Kali.mp4 (108.4 MB)
- 004 Updating Kali Software Packages.mp4 (105.3 MB)
- 006 Creating a System Inventory Using Nmap.mp4 (97.3 MB)
- 019 Enumerating Websites.mp4 (93.0 MB)
- 009 Monitoring Nmap Scans Using Verbose Logging.mp4 (90.6 MB)
- 012 Specifying Port Ranges to Make Scans More Efficient.mp4 (72.9 MB)
- 007 Identifying Open Ports and Services on Systems.mp4 (72.7 MB)
- 005 Adding a Non-Root User to Kali.mp4 (70.9 MB)
- 003 Validating Network Connectivity.mp4 (69.5 MB)
- 018 Advanced Scanning with OpenVAS.mp4 (65.1 MB)
- 010 Acquiring Permission to Conduct Network Scanning.mp4 (65.0 MB)
- 008 Finding and Remediating System Vulnerabilities.mp4 (57.4 MB)
- 017 Basic Scanning with OpenVAS.mp4 (47.5 MB)
- 001 The Course Overview.mp4 (26.6 MB)
- 012 File Analysis Tools_en.vtt (14.2 KB)
- 004 Introduction to Forensic Imaging_en.vtt (13.2 KB)
- 011 Extracting and Analyzing Browser, E-mail, and IM Artifacts_en.vtt (12.9 KB)
- 009 Overview of the Sleuth Kit and Filesystem Analysis_en.vtt (12.6 KB)
- 007 Android Device Imaging with dc3dd_en.vtt (11.6 KB)
- 010 Windows Registry Analysis with RegRipper_en.vtt (11.3 KB)
- 018 Analysis of a Windows Image with Autopsy_en.vtt (10.9 KB)
- 013 Building a Super-Timeline of the Events_en.vtt (10.7 KB)
- 015 File Carving Tools_en.vtt (10.2 KB)
- 006 Drive Imaging with dc3dd_en.vtt (8.3 KB)
- 003 Downloading and Installing Kali Linux_en.vtt (8.1 KB)
- 014 File Carving Overview_en.vtt (7.8 KB)
- 002 Brief Introduction to Digital Forensics_en.vtt (7.7 KB)
- 028 Documentation and Reporting Tools_en.vtt (6.9 KB)
- 025 Capturing Network Traffic with Wireshark_en.vtt (6.5 KB)
- 024 Introduction to Network Forensics_en.vtt (6.3 KB)
- 017 Autopsy 4 Overview and Installation_en.vtt (6.0 KB)
- 008 Image Acquisition with Guymager_en.vtt (5.8 KB)
- 020 Introduction to Memory Forensics and Acquisition_en.vtt (5.4 KB)
- 016 Extracting Data with Bulk Extractor_en.vtt (5.3 KB)
- 15230888-Network-Scanning-Pentesting-Digital-Forensic-with-kali-Linux.zip (0.4 KB)
- 001 The Course Overview_en.vtt (5.3 KB)
- 019 Analysis of an Android Image with Autopsy_en.vtt (5.3 KB)
- 005 Overview of dcfldd and dc3dd_en.vtt (5.2 KB)
- 023 Memory Analysis with Volatility_en.vtt (5.1 KB)
- 021 Memory Acquisition_en.vtt (5.1 KB)
- 027 Introduction to Reporting_en.vtt (5.0 KB)
- 026 Network Traffic Analysis with Wireshark_en.vtt (4.7 KB)
- 022 Introduction to Volatility_en.vtt (4.1 KB)
- 018 Analysis of a Windows Image with Autopsy.mp4 (89.6 MB)
- 011 Extracting and Analyzing Browser, E-mail, and IM Artifacts.mp4 (83.9 MB)
- 009 Overview of the Sleuth Kit and Filesystem Analysis.mp4 (81.9 MB)
- 012 File Analysis Tools.mp4 (77.9 MB)
- 007 Android Device Imaging with dc3dd.mp4 (73.8 MB)
- 010 Windows Registry Analysis with RegRipper.mp4 (61.6 MB)
- 013 Building a Super-Timeline of the Events.mp4 (51.2 MB)
- 004 Introduction to Forensic Imaging.mp4 (47.1 MB)
- 003 Downloading and Installing Kali Linux.mp4 (47.0 MB)
- 015 File Carving Tools.mp4 (43.8 MB)
- 006 Drive Imaging with dc3dd.mp4 (43.8 MB)
- 025 Capturing Network Traffic with Wireshark.mp4 (41.4 MB)
- 026 Network Traffic Analysis with Wireshark.mp4 (39.2 MB)
- 019 Analysis of an Android Image with Autopsy.mp4 (33.3 MB)
- 005 Overview of dcfldd and dc3dd.mp4 (32.5 MB)
- 014 File Carving Overview.mp4 (30.1 MB)
- 016 Extracting Data with Bulk Extractor.mp4 (29.5 MB)
- 001 The Course Overview.mp4 (29.0 MB)
- 017 Autopsy 4 Overview and Installation.mp4 (28.4 MB)
- 023 Memory Analysis with Volatility.mp4 (26.3 MB)
- 028 Documentation and Reporting Tools.mp4 (24.8 MB)
- 002 Brief Introduction to Digital Forensics.mp4 (23.3 MB)
- 008 Image Acquisition with Guymager.mp4 (23.2 MB)
- 021 Memory Acquisition.mp4 (23.2 MB)
-
Code:
- udp://open.stealth.si:80/announce
- udp://tracker.tiny-vps.com:6969/announce
- udp://fasttracker.foreverpirates.co:6969/announce
- udp://tracker.opentrackr.org:1337/announce
- udp://explodie.org:6969/announce
- udp://tracker.cyberia.is:6969/announce
- udp://ipv4.tracker.harry.lu:80/announce
- udp://tracker.uw0.xyz:6969/announce
- udp://opentracker.i2p.rocks:6969/announce
- udp://tracker.birkenwald.de:6969/announce
- udp://tracker.torrent.eu.org:451/announce
- udp://tracker.moeking.me:6969/announce
- udp://tracker.dler.org:6969/announce
- udp://9.rarbg.me:2970/announce