Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/labex-labs/kali-server-exploitation-in-action
Kali Server Exploitation in Action | This repo collects 20 of programming labs exercises for Kali Server Exploitation in Action. This course covers penetration testing and ethical hacking with Kali Linux. Key topics include exploiting vulnerabilities via Metasploit, scanning and exploiting networ...
https://github.com/labex-labs/kali-server-exploitation-in-action
challenges course cybersecurity exercises hands-on labex labs pen-testing playgroud programming
Last synced: 22 days ago
JSON representation
Kali Server Exploitation in Action | This repo collects 20 of programming labs exercises for Kali Server Exploitation in Action. This course covers penetration testing and ethical hacking with Kali Linux. Key topics include exploiting vulnerabilities via Metasploit, scanning and exploiting networ...
- Host: GitHub
- URL: https://github.com/labex-labs/kali-server-exploitation-in-action
- Owner: labex-labs
- Created: 2024-11-01T01:47:28.000Z (2 months ago)
- Default Branch: master
- Last Pushed: 2024-12-06T06:17:41.000Z (28 days ago)
- Last Synced: 2024-12-06T07:21:31.977Z (28 days ago)
- Topics: challenges, course, cybersecurity, exercises, hands-on, labex, labs, pen-testing, playgroud, programming
- Homepage: https://labex.io/courses/kali-server-exploitation-in-action
- Size: 4.88 KB
- Stars: 0
- Watchers: 2
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# Kali Server Exploitation in Action
[![Kali Server Exploitation in Action](https://cover-creator.appbot.io/kali-server-exploitation-in-action.png)](https://labex.io/courses/kali-server-exploitation-in-action)
[![Start-Learning](https://img.shields.io/badge/Start-Learning-whitesmoke?style=for-the-badge)](https://labex.io/courses/kali-server-exploitation-in-action)
This course covers penetration testing and ethical hacking with Kali Linux. Key topics include exploiting vulnerabilities via Metasploit, scanning and exploiting network services, brute-forcing remote access, developing custom scanners, attacking vulnerabilities like IngressLock, Samba, and Unreal IRCd, creating malicious PDFs, and privilege escalation. Through hands-on labs, you'll gain end-to-end pentesting skills - information gathering, vulnerability analysis, exploitation, and maintaining access.
![Cybersecurity](https://img.shields.io/badge/Cybersecurity-whitesmoke?style=for-the-badge&logo=cybersecurity)
![Pen-Testing](https://img.shields.io/badge/Pen-Testing-whitesmoke?style=for-the-badge&logo=pen-testing)## Environment
LabEx is an interactive, hands-on learning platform dedicated to coding and technology. It combines labs, AI assistance, and virtual machines to provide a no-video, practical learning experience.
![](https://tutorial-screenshot.getvm.io/images/vm-1725247253.png)
- A strict βLearn by Doingβ approach with exclusive hands-on labs and no videos.
- Interactive online environments within the browser, with automated step-by-step checks.
- A structured content organization with the Skill Tree based learning system.
- A growing learning resource of 30 Skill Trees and over 6,000 Labs.
- The AI learning assistant Labby, built on ChatGPT, providing a conversational learning experience.Learn more about [LabEx VM](https://support.labex.io/using-labex/virtual-machine).
## Exercises
| Index | Name | Difficulty | Practice |
|---------|---------------------------------------------------------|--------------|-------------------------------------------------------------------------------------------------------------------------------------------------|
| 01 | π Penetration Testing with Kali Linux and Metasploit... | β ββ | Start Lab |
| 02 | π A Simple Penetration Testing Practice | β ββ | Start Lab |
| 03 | π Information Gathering Penetration Testing | β ββ | Start Lab |
| 04 | π Metasploit Fundamentals and Usage | β ββ | Start Lab |
| 05 | π Network Scanning with Nmap and Metasploit | β ββ | Start Lab |
| 06 | π Discover Network Service Vulnerabilities | β ββ | Start Lab |
| 07 | π Hands-on with Kali Vulnerability Scanning Tools | β ββ | Start Lab |
| 08 | π Developing a New Metasploit Scanner | β ββ | Start Lab |
| 09 | π Attacking the Ingreslock Backdoor Vulnerability | β ββ | Start Lab |
| 10 | π Exploiting Samba Vulnerability on Linux Server | β ββ | Start Lab |
| 11 | π Exploiting Unreal IRCd Service | β ββ | Start Lab |
| 12 | π Brute-Forcing SSH and VNC Remote Connections | β ββ | Start Lab |
| 13 | π Attacking Distcc to Gain Privileges | β ββ | Start Lab |
| 14 | π Linux Server Privilege Escalation | β ββ | Start Lab |
| 15 | π Exploiting Tomcat Vulnerability | β ββ | Start Lab |
| 16 | π Exploiting NFS Misconfiguration | β ββ | Start Lab |
| 17 | π Exploiting FTP Service Vulnerabilities | β ββ | Start Lab |
| 18 | π Exploiting Telnet Service Vulnerability | β ββ | Start Lab |
| 19 | π Creating PDF Files with Windows Backdoors | β ββ | Start Lab |
| 20 | π Backdoor Creation and Clearing Traces After Attack | β ββ | Start Lab |## More
- π [Cybersecurity Programming Courses](https://github.com/labex-labs/awesome-programming-courses)
- π [Cybersecurity Programming Projects](https://github.com/labex-labs/awesome-programming-projects)
- π [Cybersecurity Free Tutorials](https://github.com/labex-labs/cybersecurity-free-tutorials)