Penetration Testing Linux

In this online, instructor led training course students will get a hands-on feel for penetration testing. The instructor goes through many of the tools available through demonstrations allowing you to scan multiple port numbers and protocols. This course will be useful for any students who are wanting to do penetration testing in the real world.

Instructor: Alex Achs

Real Class Example


Skills Learned

  • Introduction to TCP and UDP scanning
  • FTP scanning of Linux OS
  • SSH scanning of Linux OS
  • Real world application of penetration testing tools
  • Scan protocols such as LDAP, SMB, and SNMP

Who Should Attend This Course

Network Admins, Security team members, risk managers, and IT directors


None, but we recommend that students have a working knowledge of logical and physical network architectures, networking components, and TCP/IP.

Course Outline

Discovering hosts via Ping Scan

  • nmap -sn
  • What difference TTL means

TCP Scanning:

  • nmap -v -p- -sT
  • unicornscan -i -I -mT $IP:a

UDP Scanning:

  • Nmap -v -p- -sU
  • unicornscan -i -I -mU $IP:a

Searchsploit (Searches exploitdb)
Some common ports and what to do:
21 – FTP

  • Fingerprint version
  • Check for Anonymous access
  • Brute Forcing
  • MITM (Requires more setup)


  • Fingerprint version
  • Brute Force


  • Fingerprint version
  • Brute Force


  • Fingerprint version
  • Enumerate Users


  • Fingerprint version
  • Zone transfer
  • DNSRecon
  • DNSEnum


  • User enumeration
  • Potential command execution


  • Fingerprint version
  • robots.txt
  • Nikto
  • Dirbuster \ Gobuster
  • Local \ Remote File Inclusion (LFI & RFI)


  • Default Community Strings
  • MIBS
    • . Hostnames
    • . Domain Name
    • . Usernames
    • . Running Services
    • . Share Information
  • snmpwalk
  • SNMP Bruteforce


  • Enumeration


  • enum4linux
  • smbclient
  • Mounting Shares

Like What You See? Let’s Get Started Training.

Call 480-850-9200 or submit below to get pricing for you or your team.