Get a good understanding on how to use Python to automate your web penetration testing scenarios. In this course, Penetration Testing Automation Using Python and Kali Linux, you'll learn how to start automating your penetration testing tasks using Python and Kali Linux. First, you'll learn about information gathering automation. Next, you'll learn about network scanning automation. Finally, you'll learn about vulnerabilities assessment automation. By the end of this course, you'll be able to develop your own automated scanner for gathering information, scanning the network, and conducting an automated vulnerability assessment.
Course Overview Hi everyone. My name is Gus Khawaja, and welcome to this exciting course of Penetration Testing Automation Using Python and Kali Linux. You are going to enjoy this course while I share my experience with you as a penetration tester and an ex-programmer who is a 15 years of experience in the field. I know you want to get rid of the idea of being a scrub giddy, right? And stop using software tools without understanding how they work. In this course, we are going to see together how to start automating your penetration testing tasks using Python, and guess what, we will use the best operating system for penetration testers, Kali Linux. Some of the major topics that we will cover include information gathering automation, network scanning automation, vulnerabilities assessment automation, and much, much more. By the end of this course, you should be able to start developing your next piece of art using Python. Before beginning the course, you should be familiar with penetration testing and programming using Python. I hope you will join me on this journey to learn some exciting stuff with Python and Kali Linux at Pluralsight.
Welcome Hi. This is Gus Khawaja, and I am so glad that you joined me in this exciting course. In the upcoming modules, you will learn how to automate your penetration testing ideas by using the amazing programming language, Python. We're going to build together a full-functional application that automates most of your daily tasks using the best operating system for hackers, Kali Linux. Your time is expensive, so I'm going to save some discussion for later in this course. Let's get started.
Building the Automation Sandbox It's time to start to dive deep into the programming stuff. In this module, we will build together the infrastructure for our course. This is an important module because you will learn the concepts of Python automation and penetration testing. All the future modules will be based on this one. Alright, let's jump into the next demo to see a detailed overview of this module.
Reconnaissance Automation Hi. This is Gus Khawaja. In this module, you're going to learn how to implement the commands for information gathering. If you have ever done penetration testing before, you know how long it takes to conduct this phase. For some people, it's so boring so they skip it without understanding the importance of it. After finishing this module, I'm going to make your life easier. You're going to see how easy it is to use and reuse this application. I'm assuming you know what reconnaissance or information gathering is and that you want to learn Python to be able to automate your penetration testing tasks.
Internal Scanning Automation Hi. My name is Gus Khawaja, and I would like to welcome you to this exciting module using Python and Kali Linux. I had so much fun creating this module for you, and I hope you will share the same feeling as well. This module will prepare you to develop an automated scanning using Python to the internal network infrastructure of your client organization. Let's begin.
Attack Automation This is the fifth module in this course, and you are going to learn how to implement the attack logic in the pen tester automation tool pat. py. After all the hard work that you did in the previous module to find the live hosts and perform a port scan, you will see that in this module you will celebrate by attacking those vulnerable machines. Let's start.