Oreilly - Kali Linux Tutorial For Beginners
by Tarek Naja | Publisher: Packt Publishing | Release Date: August 2018 | ISBN: 9781789615173
Learn from the pros how to use Kali Linux easily and quickly.About This VideoBy the end of the course, you will have the skills to:Use common Linux commands like hackers doBuild a Linux target from scratchHack the target using what you learned in the Kali Linux tutorialCreate shell and backdoorsUnderstand and replicate what the bad guys doIn DetailYou want to learn hacking with Kali Linux but you do not know where to start? Do you find the command line confusing and intimidating? If yes, this is the perfect course for you. In this Kali Linux tutorial, we start you off with the assumption that you know absolutely nothing about Linux! Starting from scratch you will build up your knowledge on how to use Kali Linux and before you know it you will become fluent with the basic tools and commands not just in Kali, but in most Linux systems. Please note that this course builds upon some ethical hacking concepts taught in the Hacking For Beginners ethical hacking course. This is another free course provided by Hackers Academy
- Chapter 1 : Welcome
- Welcome 00:10:25
- How to Install Kali Linux on VMWare 00:06:39
- How to Install Kali Linux on VirtualBox 00:05:49
- What's new in Kali Linux 2018 00:02:53
- Chapter 2 : Part 1 - Basics of Terminal and Shell
- GUI updates in Kali Linux 2018 00:02:54
- Introduction to Graphical User Interface of Kali Linux 00:09:28
- Introduction to Kali Linux Terminal and Shell 00:07:20
- Getting the First Shell Access to a Remote System 00:03:50
- Kali Linux Terminal Signals and Shortcuts 00:06:24
- Root User and Directory Structure 00:06:36
- Chapter 3 : Kali Linux Basic Commands
- Basics of Commands 00:04:51
- Navigating Directories 00:02:44
- Creating Files and Directories 00:01:50
- Listing Directory Contents 00:06:06
- Listing File Content 00:03:35
- Copying Files and Directories 00:05:12
- Moving Files and Directories 00:04:13
- Removing Files and Directories 00:04:21
- Chapter 4 : Package Management
- Adding or Removing Packages and Updating or Upgrading the System 00:06:14
- Managing Repositories 00:05:44
- APT Updates in Kali Linux 2018 00:04:14
- Chapter 5 : Archiving and Compression
- Archiving and Compression of Files and Directories 00:15:12
- Chapter 6 : Wild Cards
- Using Wild Cards to Speed up Tasks 00:14:20
- Chapter 7 : Getting Help
- Finding Help and Navigating through 'man' Pages 00:06:17
- Chapter 8 : End of Part 1
- Chapter 9 : Part 2 – Administration
- Basic Networking Tools and Tips for Kali Linux 00:05:36
- Chapter 10 : Editing Files with Nano
- Introduction to Nano Editor 00:06:25
- Chapter 11 : Services
- Turning Kali Linux into Apache Web Server 00:09:15
- Changing Configuration File in Kali Linux 2018 00:02:57
- Turning Kali Linux into an SSH Server 00:08:41
- Chapter 12 : User and Group Management
- Managing Users and Groups 00:11:02
- Managing User and Group Permissions 00:09:31
- Chapter 13 : Process Management
- Understanding Process Management 00:08:57
- Scheduling Processes in Background 00:08:19
- Chapter 14 : Output Redirection
- Output Redirection 00:06:35
- Chaining Multiple Commands using 'Pipe' Operator 00:11:52
- Chapter 15 : End of Part 2
- Chapter 16 : Hacking with Kali Linux
- Setting up your Target 00:05:50
- Port Scanning with Kali Linux 00:07:00
- Port Scanning using Kali Linux Graphical User Interface 00:04:38
- Hacking with Kali Linux - FTP Service 00:08:22
- Vulnerability Scanning with Kali Linux 00:05:28
- Hacking with Kali Linux - SSH Service 00:11:59
- Hacking with Kali Linux - Web Service Hacking 00:10:29
- Hacking with Kali Linux - Database Hacking and Password Attacks 00:17:46
- Hacking With Kali Linux - Password Cracking 00:08:52
- Hacking with Kali Linux - Sniffing Passwords 00:11:42
- Hacking with Kali Linux - Privilege Escalation 00:05:57
- Auto Hacking with Armitage - Part 1 00:13:37
- Auto Hacking with Armitage - Part 2 00:05:44
- Hacking with Kali Linux - Quick Recap of Favorite Tools 00:05:57
- Chapter 17 : Putting It All Together
- Download and Build your own Target System 00:19:03
- Hacking your Target System with Kali Linux 00:05:45
- Can You Hack It? 00:01:42
- Chapter 18 : Shells used by Good and Bad Guys
- Understanding the Basic Web Shells 00:06:36
- Understanding the Bind Shells 00:08:09
- Understanding the Reverse Shells 00:01:57
- Quick Recap of Reverse and Bind Shell 00:02:26
- Creating a Metasploit Backdoor 00:11:54
- Bad Guy's Interactive Shell 00:05:26
- Bad Guy's Web Shells 00:02:57
- Chapter 19 : Steal the Credit Card Information from Hackers Point of View
- First Mission 00:03:06
- Port Scanning 00:03:42
- Vulnerability Scanning 00:02:43
- Vulnerability Scanning Using Nmap 00:08:19
- Initial Break-in 00:09:02
- Getting an Interactive Shell 00:08:59
- Changing SSH Config 00:04:37
- Getting SSH Access 00:05:09
- Cracking User Passwords 00:07:24
- Attacking Database Authentication 00:04:05
- Stealing the Credit Card Info 00:09:03
- Second Mission 00:08:56
- Chapter 20 : Final Mission
TO MAC USERS: If RAR password doesn't work, use this archive program:
RAR Expander 0.8.5 Beta 4 and extract password protected files without error.
TO WIN USERS: If RAR password doesn't work, use this archive program:
Latest Winrar and extract password protected files without error.