Главная
Study mode:
on
1
Intro
2
Who Am I?
3
What is Kali?
4
How to Get Kali
5
Setup Kali
6
Setup Metasploit
7
A Quick Look at Kali
8
Low Hanging Fruit
9
Unnecessary Services
10
Weak Passwords
11
Exploitable Vulnerabilities
12
Web-Based Admin Interfaces
13
Find out More
Description:
Explore the world of penetration testing and cybersecurity with this conference talk from BSides Nashville 2015. Learn about Kali Linux, a powerful open-source platform for security auditing and penetration testing. Discover how to set up and use Kali, configure Metasploit, and identify common vulnerabilities in systems. Gain insights into finding "low hanging fruit" in cybersecurity, including unnecessary services, weak passwords, exploitable vulnerabilities, and web-based admin interfaces. Perfect for both beginners and experienced professionals looking to enhance their security assessment skills.

Finding Low Hanging Fruit with Kali

Add to list