Hacking 3
Date: 2026-03-04
Difficulty: Intermediate
Delivered By: Percy Baker
Overview
Hacking 3 is the final part of the 3-part ethical hacking series where we'll teach you how to scan network targets and gain access to those targets. The aim is to walk you through roughly what a real-life penetration test might look like.
This week we will be covering tools, other than metasploit, bundled with kali linux that you can use to gain access or retrieve stored data through web services.
The session will consist of:
-
Wireshark traffic inspection, finding hidden data in network traffic between two machines
-
Using Hydra to brute force credentials to services on the network, some machines may still have unsecure, default credentials you can exploit.
-
Taking in password hashes from data leaks and using a tool called 'John The Ripper' to crack passwords of users and gain access.
-
Automated SQL injection attempts using SQLMap to find hidden tables and data that a website doesn't normally query for.
Prerequisites
To complete this session, you must have a kali Virtual Machine. You can find the details on how to install one in the links below. If you need any additional assistance in getting your VM ready for the session, please ask a member of the committee to help either before or during the session.
Useful Resources
- Our docs page for creating a Kali VM
- Guide for creating Kali VM
- A different guide for creating Kali VM
- Kali website
