Learn from the pros how to use Kali Linux easily and quickly.
About This Video
By the end of the course, you will have the skills to:
Use common Linux commands like hackers do
Build a Linux target from scratch
Hack the target using what you learned in the Kali Linux tutorial
Create shell and backdoors
Understand and replicate what the bad guys do
In Detail
You want to learn hacking with Kali Linux but you do not know where to start? Do you find the …
Kali Linux Tutorial For Beginners
Video description
Learn from the pros how to use Kali Linux easily and quickly.
About This Video
By the end of the course, you will have the skills to:
Use common Linux commands like hackers do
Build a Linux target from scratch
Hack the target using what you learned in the Kali Linux tutorial
Create shell and backdoors
Understand and replicate what the bad guys do
In Detail
You want to learn hacking with Kali Linux but you do not know where to start? Do you find the command line confusing and intimidating? If yes, this is the perfect course for you. In this Kali Linux tutorial, we start you off with the assumption that you know absolutely nothing about Linux! Starting from scratch you will build up your knowledge on how to use Kali Linux and before you know it you will become fluent with the basic tools and commands not just in Kali, but in most Linux systems. Please note that this course builds upon some ethical hacking concepts taught in the Hacking For Beginners ethical hacking course. This is another free course provided by Hackers Academy
Introduction to Graphical User Interface of Kali Linux
00:09:28
Introduction to Kali Linux Terminal and Shell
00:07:20
Getting the First Shell Access to a Remote System
00:03:50
Kali Linux Terminal Signals and Shortcuts
00:06:24
Root User and Directory Structure
00:06:36
Chapter 3 : Kali Linux Basic Commands
Basics of Commands
00:04:51
Navigating Directories
00:02:44
Creating Files and Directories
00:01:50
Listing Directory Contents
00:06:06
Listing File Content
00:03:35
Copying Files and Directories
00:05:12
Moving Files and Directories
00:04:13
Removing Files and Directories
00:04:21
Chapter 4 : Package Management
Adding or Removing Packages and Updating or Upgrading the System
00:06:14
Managing Repositories
00:05:44
APT Updates in Kali Linux 2018
00:04:14
Chapter 5 : Archiving and Compression
Archiving and Compression of Files and Directories
00:15:12
Chapter 6 : Wild Cards
Using Wild Cards to Speed up Tasks
00:14:20
Chapter 7 : Getting Help
Finding Help and Navigating through ‘man’ Pages
00:06:17
Chapter 8 : End of Part 1
End of Part 1
00:03:00
Chapter 9 : Part 2 – Administration
Basic Networking Tools and Tips for Kali Linux
00:05:36
Chapter 10 : Editing Files with Nano
Introduction to Nano Editor
00:06:25
Chapter 11 : Services
Turning Kali Linux into Apache Web Server
00:09:15
Changing Configuration File in Kali Linux 2018
00:02:57
Turning Kali Linux into an SSH Server
00:08:41
Chapter 12 : User and Group Management
Managing Users and Groups
00:11:02
Managing User and Group Permissions
00:09:31
Chapter 13 : Process Management
Understanding Process Management
00:08:57
Scheduling Processes in Background
00:08:19
Chapter 14 : Output Redirection
Output Redirection
00:06:35
Chaining Multiple Commands using ‘Pipe’ Operator
00:11:52
Chapter 15 : End of Part 2
End of Part 2
00:03:21
Chapter 16 : Hacking with Kali Linux
Setting up your Target
00:05:50
Port Scanning with Kali Linux
00:07:00
Port Scanning using Kali Linux Graphical User Interface
00:04:38
Hacking with Kali Linux - FTP Service
00:08:22
Vulnerability Scanning with Kali Linux
00:05:28
Hacking with Kali Linux - SSH Service
00:11:59
Hacking with Kali Linux - Web Service Hacking
00:10:29
Hacking with Kali Linux - Database Hacking and Password Attacks
00:17:46
Hacking With Kali Linux - Password Cracking
00:08:52
Hacking with Kali Linux - Sniffing Passwords
00:11:42
Hacking with Kali Linux - Privilege Escalation
00:05:56
Auto Hacking with Armitage - Part 1
00:13:37
Auto Hacking with Armitage - Part 2
00:05:44
Hacking with Kali Linux - Quick Recap of Favorite Tools
00:05:57
Chapter 17 : Putting It All Together
Download and Build your own Target System
00:19:03
Hacking your Target System with Kali Linux
00:05:45
Can You Hack It?
00:01:42
Chapter 18 : Shells used by Good and Bad Guys
Understanding the Basic Web Shells
00:06:36
Understanding the Bind Shells
00:08:09
Understanding the Reverse Shells
00:01:57
Quick Recap of Reverse and Bind Shell
00:02:26
Creating a Metasploit Backdoor
00:11:54
Bad Guy’s Interactive Shell
00:05:26
Bad Guy’s Web Shells
00:02:57
Chapter 19 : Steal the Credit Card Information from Hackers Point of View
First Mission
00:03:06
Port Scanning
00:03:42
Vulnerability Scanning
00:02:43
Vulnerability Scanning Using Nmap
00:08:19
Initial Break-in
00:09:02
Getting an Interactive Shell
00:08:59
Changing SSH Config
00:04:37
Getting SSH Access
00:05:09
Cracking User Passwords
00:07:24
Attacking Database Authentication
00:04:04
Stealing the Credit Card Info
00:09:03
Second Mission
00:08:56
Chapter 20 : Final Mission
What’s Next
00:02:42
Start your Free Trial Self paced Go to the Course We have partnered with providers to bring you collection of courses, When you buy through links on our site, we may earn an affiliate commission from provider.
This site uses cookies. By continuing to use this website, you agree to their use.I Accept