Kali Linux Tutorial For Beginners

Kali Linux Tutorial For Beginners

English | MP4 | AVC 1920×1080 | AAC 44KHz 2ch | 8h 29m | 2.20 GB

Learn from the pros how to use Kali Linux easily and quickly.

You want to learn hacking with Kali Linux but you do not know where to start? Do you find the command line confusing and intimidating? If yes, this is the perfect course for you. In this Kali Linux tutorial, we start you off with the assumption that you know absolutely nothing about Linux! Starting from scratch you will build up your knowledge on how to use Kali Linux and before you know it you will become fluent with the basic tools and commands not just in Kali, but in most Linux systems. Please note that this course builds upon some ethical hacking concepts taught in the Hacking For Beginners ethical hacking course. This is another free course provided by Hackers Academy

Style and Approach
The material is relevant and provides a great refresher for concepts and it introduces to entirely new methods for scanning and imposing hacking.

What You Will Learn

  • Perform basic to advanced tasks in Kali Linux
  • Hack your way through multiple customer targets
  • Learn how the good guys hack and how the bad guys hack (and get your hands on the credit cards!)
  • Understand how native Linux commands can be used by hackers
  • Build up a Linux target from scratch to hack with Kali Linux
Table of Contents

WELCOME
Welcome
How to Install Kali Linux on VMWare
How to Install Kali Linux on VirtualBox
What’s new in Kali Linux 2018

PART 1 – BASICS OF TERMINAL AND SHELL
GUI updates in Kali Linux 2018
Introduction to Graphical User Interface of Kali Linux
Introduction to Kali Linux Terminal and Shell
Getting the First Shell Access to a Remote System
Kali Linux Terminal Signals and Shortcuts
Root User and Directory Structure

KALI LINUX BASIC COMMANDS
Basics of Commands
Navigating Directories
Creating Files and Directories
Listing Directory Contents
Listing File Content
Copying Files and Directories
Moving Files and Directories
Removing Files and Directories

PACKAGE MANAGEMENT
Adding or Removing Packages and Updating or Upgrading the System
Managing Repositories
APT Updates in Kali Linux 2018

ARCHIVING AND COMPRESSION
Archiving and Compression of Files and Directories

WILD CARDS
Using Wild Cards to Speed up Tasks

GETTING HELP
Finding Help and Navigating through ‘man’ Pages
END OF PART 1
End of Part 1

PART 2 – ADMINISTRATION
Basic Networking Tools and Tips for Kali Linux

EDITING FILES WITH NANO
Introduction to Nano Editor

SERVICES
Turning Kali Linux into Apache Web Server
Changing Configuration File in Kali Linux 2018
Turning Kali Linux into an SSH Server

USER AND GROUP MANAGEMENT
Managing Users and Groups
Managing User and Group Permissions

PROCESS MANAGEMENT
Understanding Process Management
Scheduling Processes in Background

OUTPUT REDIRECTION
Output Redirection
Chaining Multiple Commands using ‘Pipe’ Operator

END OF PART 2
End of Part 2

HACKING WITH KALI LINUX
Setting up your Target
Port Scanning with Kali Linux
Port Scanning using Kali Linux Graphical User Interface
Hacking with Kali Linux – FTP Service
Vulnerability Scanning with Kali Linux
Hacking with Kali Linux – SSH Service
Hacking with Kali Linux – Web Service Hacking
Hacking with Kali Linux – Database Hacking and Password Attacks
Hacking With Kali Linux – Password Cracking
Hacking with Kali Linux – Sniffing Passwords
Hacking with Kali Linux – Privilege Escalation
Auto Hacking with Armitage – Part 1
Auto Hacking with Armitage – Part 2
Hacking with Kali Linux – Quick Recap of Favorite Tools

PUTTING IT ALL TOGETHER
Download and Build your own Target System
Hacking your Target System with Kali Linux
Can You Hack It?

SHELLS USED BY GOOD AND BAD GUYS
Understanding the Basic Web Shells
Understanding the Bind Shells
Understanding the Reverse Shells
Quick Recap of Reverse and Bind Shell
Creating a Metasploit Backdoor
Bad Guy’s Interactive Shell
Bad Guy’s Web Shells

STEAL THE CREDIT CARD INFORMATION FROM HACKERS POINT OF VIEW
First Mission
Port Scanning
Vulnerability Scanning
Vulnerability Scanning Using Nmap
Initial Break-in
Getting an Interactive Shell
Changing SSH Config
Getting SSH Access
Cracking User Passwords
Attacking Database Authentication
Stealing the Credit Card Info
Second Mission

FINAL MISSION
What’s Next