Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/labex-labs/kali-server-exploitation-in-action

Kali Server Exploitation in Action | This repo collects 20 of programming labs exercises for Kali Server Exploitation in Action. This course covers penetration testing and ethical hacking with Kali Linux. Key topics include exploiting vulnerabilities via Metasploit, scanning and exploiting networ...
https://github.com/labex-labs/kali-server-exploitation-in-action

challenges course cybersecurity exercises hands-on labex labs pen-testing playgroud programming

Last synced: 22 days ago
JSON representation

Kali Server Exploitation in Action | This repo collects 20 of programming labs exercises for Kali Server Exploitation in Action. This course covers penetration testing and ethical hacking with Kali Linux. Key topics include exploiting vulnerabilities via Metasploit, scanning and exploiting networ...

Awesome Lists containing this project

README

        

# Kali Server Exploitation in Action

[![Kali Server Exploitation in Action](https://cover-creator.appbot.io/kali-server-exploitation-in-action.png)](https://labex.io/courses/kali-server-exploitation-in-action)

[![Start-Learning](https://img.shields.io/badge/Start-Learning-whitesmoke?style=for-the-badge)](https://labex.io/courses/kali-server-exploitation-in-action)

This course covers penetration testing and ethical hacking with Kali Linux. Key topics include exploiting vulnerabilities via Metasploit, scanning and exploiting network services, brute-forcing remote access, developing custom scanners, attacking vulnerabilities like IngressLock, Samba, and Unreal IRCd, creating malicious PDFs, and privilege escalation. Through hands-on labs, you'll gain end-to-end pentesting skills - information gathering, vulnerability analysis, exploitation, and maintaining access.

![Cybersecurity](https://img.shields.io/badge/Cybersecurity-whitesmoke?style=for-the-badge&logo=cybersecurity)
![Pen-Testing](https://img.shields.io/badge/Pen-Testing-whitesmoke?style=for-the-badge&logo=pen-testing)

## Environment

LabEx is an interactive, hands-on learning platform dedicated to coding and technology. It combines labs, AI assistance, and virtual machines to provide a no-video, practical learning experience.

![](https://tutorial-screenshot.getvm.io/images/vm-1725247253.png)

- A strict β€œLearn by Doing” approach with exclusive hands-on labs and no videos.
- Interactive online environments within the browser, with automated step-by-step checks.
- A structured content organization with the Skill Tree based learning system.
- A growing learning resource of 30 Skill Trees and over 6,000 Labs.
- The AI learning assistant Labby, built on ChatGPT, providing a conversational learning experience.

Learn more about [LabEx VM](https://support.labex.io/using-labex/virtual-machine).

## Exercises

| Index | Name | Difficulty | Practice |
|---------|---------------------------------------------------------|--------------|-------------------------------------------------------------------------------------------------------------------------------------------------|
| 01 | πŸ“– Penetration Testing with Kali Linux and Metasploit... | β˜…β˜†β˜† | Start Lab |
| 02 | πŸ“– A Simple Penetration Testing Practice | β˜…β˜†β˜† | Start Lab |
| 03 | πŸ“– Information Gathering Penetration Testing | β˜…β˜†β˜† | Start Lab |
| 04 | πŸ“– Metasploit Fundamentals and Usage | β˜…β˜†β˜† | Start Lab |
| 05 | πŸ“– Network Scanning with Nmap and Metasploit | β˜…β˜†β˜† | Start Lab |
| 06 | πŸ“– Discover Network Service Vulnerabilities | β˜…β˜†β˜† | Start Lab |
| 07 | πŸ“– Hands-on with Kali Vulnerability Scanning Tools | β˜…β˜†β˜† | Start Lab |
| 08 | πŸ“– Developing a New Metasploit Scanner | β˜…β˜†β˜† | Start Lab |
| 09 | πŸ“– Attacking the Ingreslock Backdoor Vulnerability | β˜…β˜†β˜† | Start Lab |
| 10 | πŸ“– Exploiting Samba Vulnerability on Linux Server | β˜…β˜†β˜† | Start Lab |
| 11 | πŸ“– Exploiting Unreal IRCd Service | β˜…β˜†β˜† | Start Lab |
| 12 | πŸ“– Brute-Forcing SSH and VNC Remote Connections | β˜…β˜†β˜† | Start Lab |
| 13 | πŸ“– Attacking Distcc to Gain Privileges | β˜…β˜†β˜† | Start Lab |
| 14 | πŸ“– Linux Server Privilege Escalation | β˜…β˜†β˜† | Start Lab |
| 15 | πŸ“– Exploiting Tomcat Vulnerability | β˜…β˜†β˜† | Start Lab |
| 16 | πŸ“– Exploiting NFS Misconfiguration | β˜…β˜†β˜† | Start Lab |
| 17 | πŸ“– Exploiting FTP Service Vulnerabilities | β˜…β˜†β˜† | Start Lab |
| 18 | πŸ“– Exploiting Telnet Service Vulnerability | β˜…β˜†β˜† | Start Lab |
| 19 | πŸ“– Creating PDF Files with Windows Backdoors | β˜…β˜†β˜† | Start Lab |
| 20 | πŸ“– Backdoor Creation and Clearing Traces After Attack | β˜…β˜†β˜† | Start Lab |

## More

- πŸ”— [Cybersecurity Programming Courses](https://github.com/labex-labs/awesome-programming-courses)
- πŸ”— [Cybersecurity Programming Projects](https://github.com/labex-labs/awesome-programming-projects)
- πŸ”— [Cybersecurity Free Tutorials](https://github.com/labex-labs/cybersecurity-free-tutorials)