Linux Exploits & Mitigation: Penetration Tools

placeholder

The baseline of security for any computer system is a defense against known exploits and attacks. In this course you ll learn how to employ the core pentesting tools to help validate that your systems and software are secure against known attacks. You ll start by learning how to leverage the capabilities of Metasploit by using its basic commands payloads and options. You ll then explore Metasploitable Commix as well as Exploit Database SearchSploit and the Linux Exploit Suggester. Next you ll learn how to use RouterSploit and ShellNoob to carry out tests. Finally you ll examine how to use SQLMap to explore how SQL injection attacks are formed and how to protect against them.