Featured resource
2026 Tech Forecast
2026 Tech Forecast

Stay ahead of what’s next in tech with predictions from 1,500+ business leaders, insiders, and Pluralsight Authors.

Get these insights
  • Course

Post Exploitation with Kali Linux

Kali Linux is a flavor of Linux that comes pre-loaded with many security tools for all levels of the attack kill chain. This course will teach you about post exploitation techniques using Kali Linux.

Beginner
1h 9m
(7)

Created by Kat DeLorean Seymour

Last Updated Feb 03, 2023

Course Thumbnail
  • Course

Post Exploitation with Kali Linux

Kali Linux is a flavor of Linux that comes pre-loaded with many security tools for all levels of the attack kill chain. This course will teach you about post exploitation techniques using Kali Linux.

Beginner
1h 9m
(7)

Created by Kat DeLorean Seymour

Last Updated Feb 03, 2023

Get started today

Access this course and other top-rated tech content with one of our business plans.

Try this course for free

Access this course and other top-rated tech content with one of our individual plans.

This course is included in the libraries shown below:

  • Security
What you'll learn

Setting up an environment to practice and learn various security techniques can be a challenge. Kali Linux is a flavor of Linux that comes pre-loaded with various security tools that are organized to help you practice your skills in different areas. This also makes it a perfect standardized platform for you to learn on. We will cover post exploitation using Kali Linux with some of the pre- loaded tools available to you. The course assumes you have already conducted an assessment up to the point of exploitation and are ready to learn what to do once you have established your foothold on a network. In this course, post exploitation with Kali, you’ll learn to perform post exploitation using Kali Linux. First, you’ll explore creating a backdoor with Metasploit and veil. Next, you’ll discover command and control using empire and impacket. Finally, you’ll learn how to establish persistence and exfiltrate your data. When you’re finished with this course, you’ll have the skills and knowledge of post exploitation needed to successfully execute that step of the attack kill chain.

Post Exploitation with Kali Linux
Beginner
1h 9m
(7)
Table of contents

About the author
Kat DeLorean Seymour - Pluralsight course - Post Exploitation with Kali Linux
Kat DeLorean Seymour
6 courses 4.6 author rating 58 ratings

Kat Seymour is a Sr. Security Author with 20 years of experience in technology and information security. She specializes in Red, Blue, and Purple team operations, tools, and techniques.

Get started with Pluralsight