Back

Hacking With Kali Linux

Ready to level up your hacking skills? Join the #1 ranking Kali Linux tutorial and get familiar with the most popular hacking operating system in the world!

Tarek

Lead Trainer

6h 51m

Course Summary

Description
<p>Step into the world of cutting-edge cybersecurity with "Hacking With Kali Linux " This dynamic course is designed for both beginners and intermediate students eager to unlock the power of Kali Linux, the premier toolkit for ethical hacking and penetration testing. What You'll Learn:</p><ul><li><p>Introduction to Kali Linux: Get started with Kali Linux, the go-to operating system for security professionals. Learn the basics of navigating and configuring Kali Linux to set up your own hacking environment.</p></li><li><p>Essential Hacking Tools: Dive deep into the diverse arsenal of tools Kali Linux offers. From network scanning and vulnerability assessment to password cracking and exploitation, you’ll become proficient with tools like Nmap, Metasploit, and Wireshark.</p></li><li><p>Practical Penetration Testing Techniques: Master the art of ethical hacking through hands-on exercises. Conduct real-world penetration tests, uncover vulnerabilities, and practice exploiting weaknesses in a safe, controlled environment.</p></li><li><p>Interactive Labs: Engage in practical, lab-based activities that simulate actual hacking scenarios.</p></li></ul><h5><strong>Who is this course for?</strong></h5><ul><li><p>Cybersecurity students</p></li><li><p>Aspiring penetration testers and red teamers</p></li><li><p>SOC Analysts L1<br></p></li></ul>

Course Curriculum

Welcome!

1 lessons

1. Welcome!

11:23

How to Install Kali Linux

4 lessons

2. root user in Kali Linux

3:28

3. Linux Desktop Environments

1:30

4. Preferred: Kali Using Pre-built Virtual Machine

10:03

5. Install Kali From Scratch on Virtualbox

7:49

Kali Linx Basic Commands

8 lessons

6. Changing Directories

2:20

7. Creating files and directories

1:54

8. Command Basics

5:05

9. Listing folder content

5:30

10. Listing file content

3:34

11. Copying files and folders

4:35

12. Moving files and folders

4:31

13. Removing files and folders

4:20

Package Management

3 lessons

14. APT-GET

6:14

15. Installing and removing packages

5:43

16. Managing repositories

5:43

Archiving and Compression

1 lessons

17. Archiving and compression

14:43

Wild Cards

2 lessons

18. Wild cards mission

19. Using Wild cards

14:16

Getting Help

1 lessons

20. Finding help and navigating man pages

6:07

Networking Basics With Kali Linux

5 lessons

21. Networking basics

8:45

22. Using nano Editor

6:56

23. Turning your Kali Linux into an SSH server

7:32

24. Turning your Kali Linux into a web server

8:49

25. Troubleshooting SSH access

Kali Linux Users and Groups

2 lessons

26. Understanding permissions

9:31

27. Users and Groups

11:-1

Processes with Kali Linux

2 lessons

28. Managing processes

10:40

29. Handling multiple processes

11:26

Redirection and Piping

1 lessons

30. Command redirection and controlling output

8:35

Target Setup

3 lessons

31. Setting up your target

5:49

32. About Your First Shell

33. Getting Your First Shell

3:49

Hacking With Kali Linux

11 lessons

34. Port scanning with Kali Linux

7:-1

35. Hacking with Kali Linux - FTP Service

8:22

36. Install Nessus on Kali Linux

37. Vulnerability scanning with Kali Linux

5:27

38. SSH Hacking Update

39. Hacking with Kali Linux - SSH Service

11:58

40. Hacking with Kali Linux - Web service hacking

10:28

41. Hacking with Kali Linux - Database hacking and password attacks

17:46

42. Hacking with Kali Linux- Password Cracking

8:51

43. Hacking with Kali Linux - Sniffing passwords

11:42

44. Hacking with Kali Linux - Privilege escalation

5:56

Armitage

4 lessons

45. IMPORTANT NOTE ON ARMITAGE

46. Armitage Connection Error

47. Auto Hacking with Armitage - Part 1

13:37

48. Auto Hacking with Armitage - Part 2

5:43

Shells Used By Good And Bad Guys

8 lessons

49. Basic web shells

6:35

50. Understanding bind shells

8:08

51. Understanding reverse shells

1:57

52. Bind/reverse shells recap

2:25

53. Creating a Metasploit backdoor

11:53

54. Bad guy's interactive shell

5:26

55. Bad guy's web shells

2:56

56. One of my favorite web shells

Hacking Like The Bad Guys

10 lessons

57. First Mission

3:06

58. Download Link

59. Port scanning

3:41

60. Vulnerability Scanning

2:42

61. Vulnerability Scanning Using Nmap

8:18

62. Initial Break-in

9:02

63. Getting an Interactive Shell

8:58

64. Changing SSH config

4:36

65. Getting SSH Access

5:08

66. Cracking User Passwords

7:23

More Hacking With Kali Linux

1 lessons

67. Download Links

Final Mission

1 lessons

68. Instructions