Back

Hacking With Kali Linux

#1 Ranking Kali Linux Tutorial!

Tarek

Lead Trainer

6h 51m

Course Summary

Description
Step into the world of cutting-edge cybersecurity with "Hacking With Kali Linux " This dynamic course is designed for both beginners and intermediate students eager to unlock the power of Kali Linux, the premier toolkit for ethical hacking and penetration testing.

What You'll Learn:

Introduction to Kali Linux: Get started with Kali Linux, the go-to operating system for security professionals. Learn the basics of navigating and configuring Kali Linux to set up your own hacking environment.
Essential Hacking Tools: Dive deep into the diverse arsenal of tools Kali Linux offers. From network scanning and vulnerability assessment to password cracking and exploitation, you’ll become proficient with tools like Nmap, Metasploit, and Wireshark.
Practical Penetration Testing Techniques: Master the art of ethical hacking through hands-on exercises. Conduct real-world penetration tests, uncover vulnerabilities, and practice exploiting weaknesses in a safe, controlled environment.
Interactive Labs: Engage in practical, lab-based activities that simulate actual hacking scenarios. These interactive sessions provide a tangible understanding of how tools and techniques are applied in the field.
By the end of this course, you’ll have a solid grasp of Kali Linux and its powerful tools, ready to tackle penetration testing challenges with confidence. Whether you're looking to jumpstart a career in cybersecurity or enhance your technical skills, this course provides the knowledge and experience needed to excel in the world of ethical hacking.

Course Curriculum

Welcome!

1 lessons

1. Welcome!

11:23

How to Install Kali Linux

5 lessons

2. root user in Kali Linux

3:28

3. Linux Desktop Environments

1:30

4. Preferred: Kali Using Pre-built Virtual Machine

10:03

5. Install Kali From Scratch on Virtualbox

7:49

6. Install Kali

Kali Linx Basic Commands

8 lessons

7. Command Basics

5:05

8. Changing Directories

2:20

9. Creating files and directories

1:54

10. Listing folder content

5:30

11. Listing file content

3:34

12. Copying files and folders

4:35

13. Moving files and folders

4:31

14. Removing files and folders

4:20

Package Management

3 lessons

15. APT-GET

6:14

16. Installing and removing packages

5:43

17. Managing repositories

5:43

Archiving and Compression

1 lessons

18. Archiving and compression

14:43

Wild Cards

2 lessons

19. Using Wild cards

14:16

20. Wild cards mission

Getting Help

1 lessons

21. Finding help and navigating man pages

6:07

Networking Basics With Kali Linux

5 lessons

22. Networking basics

8:45

23. Using nano Editor

6:56

24. Turning your Kali Linux into an SSH server

7:32

25. Turning your Kali Linux into a web server

8:49

26. Troubleshooting SSH access

Kali Linux Users and Groups

2 lessons

27. Understanding permissions

9:31

28. Users and Groups

11:-1

Processes with Kali Linux

2 lessons

29. Managing processes

10:40

30. Handling multiple processes

11:26

Redirection and Piping

1 lessons

31. Command redirection and controlling output

8:35

Target Setup

3 lessons

32. Setting up your target

5:49

33. About Your First Shell

34. Getting Your First Shell

3:49

Hacking With Kali Linux

11 lessons

35. Port scanning with Kali Linux

7:-1

36. Hacking with Kali Linux - FTP Service

8:22

37. Install Nessus on Kali Linux

38. Vulnerability scanning with Kali Linux

5:27

39. SSH Hacking Update

40. Hacking with Kali Linux - SSH Service

11:58

41. Hacking with Kali Linux - Web service hacking

10:28

42. Hacking with Kali Linux - Database hacking and password attacks

17:46

43. Hacking with Kali Linux- Password Cracking

8:51

44. Hacking with Kali Linux - Sniffing passwords

11:42

45. Hacking with Kali Linux - Privilege escalation

5:56

Armitage

4 lessons

46. IMPORTANT NOTE ON ARMITAGE

47. Armitage Connection Error

48. Auto Hacking with Armitage - Part 1

13:37

49. Auto Hacking with Armitage - Part 2

5:43

Shells Used By Good And Bad Guys

8 lessons

50. Basic web shells

6:35

51. Understanding bind shells

8:08

52. Understanding reverse shells

1:57

53. Bind/reverse shells recap

2:25

54. Creating a Metasploit backdoor

11:53

55. Bad guy's interactive shell

5:26

56. Bad guy's web shells

2:56

57. One of my favorite web shells

Hacking Like The Bad Guys

10 lessons

58. First Mission

3:06

59. Download Link

60. Port scanning

3:41

61. Vulnerability Scanning

2:42

62. Vulnerability Scanning Using Nmap

8:18

63. Initial Break-in

9:02

64. Getting an Interactive Shell

8:58

65. Changing SSH config

4:36

66. Getting SSH Access

5:08

67. Cracking User Passwords

7:23

More Hacking With Kali Linux

1 lessons

68. Download Links

Final Mission

1 lessons

69. Instructions