Tutorialspoint

Celebrating 11 Years of Learning Excellence! Use: TP11

IT Security Gumbo: Exploitation with Kali

person icon Corey Charles

4.7

IT Security Gumbo: Exploitation with Kali

Hands On Penetration Testing with Kali Linux

updated on icon Updated on Jun, 2025

language icon Language - English

person icon Corey Charles

English [CC]

category icon IT and Software ,Network and Security,Cyber Security

Lectures -9

Duration -1 hours

Lifetime Access

4.7

price-loader

Lifetime Access

30-days Money-Back Guarantee

Training 5 or more people ?

Get your team access to 10000+ top Tutorials Point courses anytime, anywhere.

Course Description

IT Security Gumbo: Exploitation with Kali

This course consists of 100% hands-on technical labs, utilizing Kali Linux to hack a variety of intentionally vulnerable operating systems. All of the resources to build the labs are free. Detailed instructions on how to set up the labs are included within this course. To make the most out of this course, it is recommended that you actually perform the activities within the labs rather than just watch the videos.

1. Exploiting Services

  • Samba Exploit
  • IRC Exploit
  • Java RMI Exploit

2. Exploiting Shellshock

  • Using MSF
  • Using HTTP
  • Using BadBash

3. Exploiting Privilege Escalation

  • Kernel Exploit
  • Empire and Setoolkit

Who this course is for?

  • Cybersecurity Students
  • Cybersecurity Professionals
  • CEH Candidates

Goals

  • Perform remote exploitation of systems.
  • Escalate local privileges to root level.
  • Utilize a variety of industry-standard penetration testing tools within the Kali Linux distro.

Prerequisites

  • Basic Linux knowledge.
  • Basic networking knowledge.
  • VirtualBox.
  • Windows 7 VM.
  • Desktop or Laptop with a minimum of 2GB RAM.
IT Security Gumbo: Exploitation with Kali

Curriculum

Check out the detailed breakdown of what’s inside the course

Exploiting Services

3 Lectures
  • play icon Samba Exploit 07:00 07:00
  • play icon IRC Exploit 07:02 07:02
  • play icon Java RMI Exploit 10:28 10:28

Exploiting Shell Shock

3 Lectures
Tutorialspoint

Exploiting Privilege Escalation

2 Lectures
Tutorialspoint

Instructor Details

Corey Charles

Corey Charles

Corey Charles is Security+, Qualys Vulnerability Management Specialist Certified. Mr. Charles has 11 years experience in IT Security with a direct focus in Vulnerability Management. Mr. Charles also taught  on the collegiate level, teaching IT Security at Herzing University.

Mr. Charles also holds two Bachelors of Arts Degrees, Digital Design and Media Arts, one Associates, Digital Design from Tulane University. Two Master Degrees from Strayer University, Master of Science in Computer
Security Management and Master of Science in Computer Forensics Management. He holds an Executive Graduate Certification in Computer Networking.

Course Certificate

Use your certificate to make a career change or to advance in your current career.

sample Tutorialspoint certificate

Our students work
with the Best

Related Video Courses

View More

Annual Membership

Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video Courses

Subscribe now
Annual Membership

Online Certifications

Master prominent technologies at full length and become a valued certified professional.

Explore Now
Online Certifications

Talk to us

1800-202-0515