Video description
Learn from the pros how to use Kali Linux easily and quickly.
About This Video
By the end of the course, you will have the skills to:
- Use common Linux commands like hackers do
- Build a Linux target from scratch
- Hack the target using what you learned in the Kali Linux tutorial
- Create shell and backdoors
- Understand and replicate what the bad guys do
In Detail
You want to learn hacking with Kali Linux but you do not know where to start? Do you find the command line confusing and intimidating? If yes, this is the perfect course for you. In this Kali Linux tutorial, we start you off with the assumption that you know absolutely nothing about Linux! Starting from scratch you will build up your knowledge on how to use Kali Linux and before you know it you will become fluent with the basic tools and commands not just in Kali, but in most Linux systems. Please note that this course builds upon some ethical hacking concepts taught in the Hacking For Beginners ethical hacking course. This is another free course provided by Hackers Academy
Publisher resources
Table of contents
-
Chapter 1 : Welcome
- Welcome 00:10:25
- How to Install Kali Linux on VMWare 00:06:39
- How to Install Kali Linux on VirtualBox 00:05:49
- What's new in Kali Linux 2018 00:02:53
-
Chapter 2 : Part 1 - Basics of Terminal and Shell
- GUI updates in Kali Linux 2018 00:02:54
- Introduction to Graphical User Interface of Kali Linux 00:09:28
- Introduction to Kali Linux Terminal and Shell 00:07:20
- Getting the First Shell Access to a Remote System 00:03:50
- Kali Linux Terminal Signals and Shortcuts 00:06:24
- Root User and Directory Structure 00:06:36
-
Chapter 3 : Kali Linux Basic Commands
- Basics of Commands 00:04:51
- Navigating Directories 00:02:44
- Creating Files and Directories 00:01:50
- Listing Directory Contents 00:06:06
- Listing File Content 00:03:35
- Copying Files and Directories 00:05:12
- Moving Files and Directories 00:04:13
- Removing Files and Directories 00:04:21
-
Chapter 4 : Package Management
- Adding or Removing Packages and Updating or Upgrading the System 00:06:14
- Managing Repositories 00:05:44
- APT Updates in Kali Linux 2018 00:04:14
- Chapter 5 : Archiving and Compression
-
Chapter 6 : Wild Cards
- Using Wild Cards to Speed up Tasks 00:14:20
- Chapter 7 : Getting Help
-
Chapter 8 : End of Part 1
- End of Part 1 00:03:00
- Chapter 9 : Part 2 – Administration
-
Chapter 10 : Editing Files with Nano
- Introduction to Nano Editor 00:06:25
- Chapter 11 : Services
-
Chapter 12 : User and Group Management
- Managing Users and Groups 00:11:02
- Managing User and Group Permissions 00:09:31
-
Chapter 13 : Process Management
- Understanding Process Management 00:08:57
- Scheduling Processes in Background 00:08:19
-
Chapter 14 : Output Redirection
- Output Redirection 00:06:35
- Chaining Multiple Commands using 'Pipe' Operator 00:11:52
-
Chapter 15 : End of Part 2
- End of Part 2 00:03:21
-
Chapter 16 : Hacking with Kali Linux
- Setting up your Target 00:05:50
- Port Scanning with Kali Linux 00:07:00
- Port Scanning using Kali Linux Graphical User Interface 00:04:38
- Hacking with Kali Linux - FTP Service 00:08:22
- Vulnerability Scanning with Kali Linux 00:05:28
- Hacking with Kali Linux - SSH Service 00:11:59
- Hacking with Kali Linux - Web Service Hacking 00:10:29
- Hacking with Kali Linux - Database Hacking and Password Attacks 00:17:46
- Hacking With Kali Linux - Password Cracking 00:08:52
- Hacking with Kali Linux - Sniffing Passwords 00:11:42
- Hacking with Kali Linux - Privilege Escalation 00:05:57
- Auto Hacking with Armitage - Part 1 00:13:37
- Auto Hacking with Armitage - Part 2 00:05:44
- Hacking with Kali Linux - Quick Recap of Favorite Tools 00:05:57
-
Chapter 17 : Putting It All Together
- Download and Build your own Target System 00:19:03
- Hacking your Target System with Kali Linux 00:05:45
- Can You Hack It? 00:01:42
-
Chapter 18 : Shells used by Good and Bad Guys
- Understanding the Basic Web Shells 00:06:36
- Understanding the Bind Shells 00:08:09
- Understanding the Reverse Shells 00:01:57
- Quick Recap of Reverse and Bind Shell 00:02:26
- Creating a Metasploit Backdoor 00:11:54
- Bad Guy's Interactive Shell 00:05:26
- Bad Guy's Web Shells 00:02:57
-
Chapter 19 : Steal the Credit Card Information from Hackers Point of View
- First Mission 00:03:06
- Port Scanning 00:03:42
- Vulnerability Scanning 00:02:43
- Vulnerability Scanning Using Nmap 00:08:19
- Initial Break-in 00:09:02
- Getting an Interactive Shell 00:08:59
- Changing SSH Config 00:04:37
- Getting SSH Access 00:05:09
- Cracking User Passwords 00:07:24
- Attacking Database Authentication 00:04:05
- Stealing the Credit Card Info 00:09:03
- Second Mission 00:08:56
-
Chapter 20 : Final Mission
- What's Next 00:02:42
Product information
- Title: Kali Linux Tutorial For Beginners
- Author(s):
- Release date: August 2018
- Publisher(s): Packt Publishing
- ISBN: 9781789615173
You might also like
video
Learn Ethical Hacking From Scratch
Become an ethical hacker that can hack and secure computer systems About This Video You will …
video
The Complete Cybersecurity Bootcamp (Video Collection): Threat Defense, Ethical Hacking, and Incident Handling
More than 25 Hours of Expert Video Instruction This course is a complete guide to help …
video
The Complete Ethical Hacking Course
Protect yourself from hackers and cyber attacks. Master penetration testing + build security and coding tools …
video
Microsoft AZ-900 Certification Course: Azure Fundamentals
Not sure where to start with the Microsoft Azure platform? Whether an IT pro or new …