Hi
user
Admin Login:
Username:
Password:
Name:
An introduction to Penetration Testing using Kali Linux
--client
lca
--show
lca2020
--room room_9 15128 --force
Prev: (none, at start of list)
Next: 1 Velociraptor - Dig Deeper
show more...
Marks
Author(s):
Marcus Herstik
Location
Room 9
Date
jan Wed 15
Days Raw Files
Start
10:45
First Raw Start
error-in-template
Duration
0:100:0
Offset
None
End
12:25
Last Raw End
Chapters
Total cuts_time
None min.
https://lca2020.linux.org.au/schedule/presentation/67/
raw-playlist
raw-mp4-playlist
encoded-files-playlist
mp4
svg
png
assets
release.pdf
An_introduction_to_Penetration_Testing_using_Kali_Linux.json
logs
Admin:
episode
episode list
cut list
raw files day
marks day
marks day
image_files
State:
---------
borked
edit
encode
push to queue
post
richard
review 1
email
review 2
make public
tweet
to-miror
conf
done
Locked:
clear this to unlock
Locked by:
user/process that locked.
Start:
initially scheduled time from master, adjusted to match reality
Duration:
length in hh:mm:ss
Name:
Video Title (shows in video search results)
Emails:
email(s) of the presenter(s)
Released:
Unknown
Yes
No
has someone authorised pubication
Normalise:
Channelcopy:
m=mono, 01=copy left to right, 10=right to left, 00=ignore.
Thumbnail:
filename.png
Description:
For those who have always wanted to know a little about hacking this is an introduction to some of the tools available in Kali Linux and how you can use it to check your network for security flaws (aka vulnerabilities). As an introduction to pen-testing, this is designed for novices who are interested in the Cyber Kill Chain, how to test common systems and those wanting to know how to get started, rather than just watching videos. As such this is not intended for advanced users. Many people use tools and systems like Kali to run penetration tests without really knowing what we are doing. This tutorial will introduce a few tools and will have a vulnerable server or two for you to launch your attacks against ensuring this is a closer to real-life attack, rather than just theoretical. Users will need a version of Kali Linux installed or the ability to quickly copy a virtual machine (VirtualBox is the suggested software for this). Short guidance at the beginning will be provided for this but users will need the VirtualBox software installed. We will start by finding the device, then testing for vulnerabilities and attempting to gain access. A step-by-step guide will ensure that all people get some action and hopefully a greater understanding of the mindset and complexity of what it means to "hack" in to something. Participant will need to bring their own laptop with the following minimum recommended specs: 4GB RAM - 2 will be used by the VM, 20GB HDD space, at least 4 processors, wireless network card, VirtualBox or similar ( VMWare or KVM/QCOW etc). Only VirtualBox will be supported and I allow 10 minutes at most for setup. This tutorial will be run by one of the writers of the TAFE NSW Cybersecurity course and a tutor for Cybersecurity at SCU on the Gold Coast.
markdown
Comment:
production notes
Rf filename:
root is .../show/dv/location/, example: 2013-03-13/13:13:30.dv
Sequence:
get this:
check and save to add this
Veyepar
Video Eyeball Processor and Review