Linux Exploits & Mitigation: Penetration Tools

Ubuntu 20.04    |    Expert
  • 14 videos | 59m 32s
  • Includes Assessment
  • Earns a Badge
Rating 4.0 of 4 users Rating 4.0 of 4 users (4)
The baseline of security for any computer system is a defense against known exploits and attacks. In this course, you'll learn how to employ the core pentesting tools to help validate that your systems and software are secure against known attacks. You'll start by learning how to leverage the capabilities of Metasploit by using its basic commands, payloads, and options. You'll then explore Metasploitable, Commix, as well as Exploit Database, SearchSploit, and the Linux Exploit Suggester. Next, you'll learn how to use RouterSploit and ShellNoob to carry out tests. Finally, you'll examine how to use SQLMap to explore how SQL injection attacks are formed and how to protect against them.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Navigate the basic commands used to prepare exploit tests using metasploit
    Run the metasploitable vulnerable virtual machine
    Prepare a metasploit command that exploits a vulnerable web service
    Modify options used to vary the operation of a metasploit command
    Exploit an outdated samba file sharing service to gain root access using metasploit
    Test for command injection vulnerabilities in web-based applications using commix
  • Search for exploits and shellcodes using exploit database
    Detect linux security weaknesses using the linux exploit suggester utility
    Scan for potential router vulnerabilities using routersploit
    Resolve opcodes and syscall numbers from binary executables using shellnoob
    Convert shellcode between binary and text formats using shellnoob
    Explore the use of sql injection attacks and protections against them using sqlmap
    Summarize the key concepts covered in this course

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.8 of 11 users Rating 4.8 of 11 users (11)
Rating 4.6 of 239 users Rating 4.6 of 239 users (239)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.7 of 6 users Rating 4.7 of 6 users (6)
Rating 4.4 of 108 users Rating 4.4 of 108 users (108)
Rating 4.6 of 41 users Rating 4.6 of 41 users (41)