Linux Exploits & Mitigation: Penetration Tools
Ubuntu 20.04
| Expert
- 14 Videos | 59m 32s
- Includes Assessment
- Earns a Badge
The baseline of security for any computer system is a defense against known exploits and attacks. In this course, you'll learn how to employ the core pentesting tools to help validate that your systems and software are secure against known attacks. You'll start by learning how to leverage the capabilities of Metasploit by using its basic commands, payloads, and options. You'll then explore Metasploitable, Commix, as well as Exploit Database, SearchSploit, and the Linux Exploit Suggester. Next, you'll learn how to use RouterSploit and ShellNoob to carry out tests. Finally, you'll examine how to use SQLMap to explore how SQL injection attacks are formed and how to protect against them.
WHAT YOU WILL LEARN
-
discover the key concepts covered in this coursenavigate the basic commands used to prepare exploit tests using Metasploitrun the Metasploitable vulnerable virtual machineprepare a Metasploit command that exploits a vulnerable web servicemodify options used to vary the operation of a Metasploit commandexploit an outdated Samba file sharing service to gain root access using Metasploittest for command injection vulnerabilities in web-based applications using Commix
-
search for exploits and shellcodes using Exploit Databasedetect Linux security weaknesses using the Linux Exploit Suggester utilityscan for potential router vulnerabilities using RouterSploitresolve opcodes and syscall numbers from binary executables using ShellNoobconvert shellcode between binary and text formats using ShellNoobexplore the use of SQL injection attacks and protections against them using SQLMapsummarize the key concepts covered in this course
IN THIS COURSE
-
1.Course Overview1m 15sUP NEXT
-
2.Exploring Metasploit Commands5m
-
3.Running a Vulnerable Environment5m 29s
-
4.Exploiting a Vulnerable Web Service4m
-
5.Scanning SMTP4m 17s
-
6.Exploiting Vulnerable File Sharing3m 58s
-
7.Uploading Injections4m 14s
-
8.Searching for Exploits6m 3s
-
9.Detecting Exploits5m 11s
-
10.Scanning with RouterSploit4m 13s
-
11.Inspecting Opcodes4m 10s
-
12.Converting Shellcode4m 46s
-
13.SQL Injection6m 11s
-
14.Course Summary44s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.