This course was created with the
course builder. Create your online course today.
Start now
Create your course
with
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Penetration Testing With Kali Linux
Introduction
Course Structure (1:59)
Installation & Configuration
Installing Kali ,Virtual Box & Windows VM (6:56)
Configuring Kali Linux ,Vulnerable VMs & Discovery of IP,Services & Port using NMAP (10:38)
LAB 1-3
Installation & Configuration of Vulnerable VM (0:45)
LAB -1 VTCSEC-EASY (17:18)
LAB 2- SMB exploitation (27:01)
LAB-3-Exploitation of SQL Injection and root the VM (12:49)
LAB 4-6
Installation & Configuration (0:45)
LAB 4 - Sickos1.2 Exploitation Part-1 (19:10)
LAB 4 - SickOS 1.2 Exploitation Part-2 (18:07)
Lab 5- WordPress Plugin Exploitation-1 (13:33)
Lab 5 -WordPress Plugin Exploitation-2 (5:26)
LAB -6 -vulnos2 -Part-1 Exploitation (25:35)
LAB -6 - Vulnos2_Part2_Intermediate (7:50)
Feedback & Comments
LAB-3-Exploitation of SQL Injection and root the VM
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock