Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Kali Linux Tutorial For Beginners
Welcome!
Course Introduction (13:44)
How to install Kali Linux on VMWare Workstation 2018 (6:38)
How to install Kali Linux on Virtualbox 2018 (5:48)
What changed in 2018 (2:53)
Part 1: First Look At Kali Linux
GUI changes in Kali Linux 2018 (2:54)
Kali Linux Gui (9:28)
The terminal and shell (7:20)
Getting your first shell! (3:50)
Terminal signals and shortcuts (6:23)
Root user and directory structure (6:36)
Part 2: Building The Foundations
Basics of commands (4:51)
Changing folders (2:44)
Creating files and directories (1:50)
Listing folder content (6:05)
Listing file content (3:34)
Copying files and folders (5:12)
Moving files and folders (4:13)
Installing and removing packages (6:13)
Managing repositories (5:43)
APT changes in Kali Linux 2018 (4:13)
Removing files and folders (4:20)
Archiving and compression (15:11)
How and when to use wildcards (14:20)
Finding help and navigating man pages (6:16)
End Of Section Note (2:59)
Part 3: Kali Linux Administration
Networking basics on Kali Linux (5:35)
How to edit files with nano (6:25)
Turning your Kali Linux into a Web Server (9:15)
Configuration file changes in Kali Linux 2018 (2:56)
Turning your Kali Linux into an SSH server (8:40)
Managing users and groups (11:01)
Maintaining permissions of users (9:31)
Understanding processes (8:56)
Managing processes (8:18)
New Lecture
Command redirection and controlling output (6:35)
Chaining multiple commands together (11:51)
End of Part 2 (3:21)
Part 4: Hacking With Kali Linux
Set up your target (5:49)
Port scanning with Kali Linux (6:59)
New Lecture
Port scanning using Kali Linux graphical interface (4:37)
Hacking with Kali Linux - FTP hacking (8:22)
Vulnerability scanning with Kali Linux (5:27)
Hacking with Kali Linux - SSH hacking (11:58)
Hacking with Kali Linux - Web service hacking (10:28)
Hacking With Kali Linux - Password Cracking (8:51)
Hacking with Kali Linux - Sniffing passwords (11:42)
Hacking with Kali Linux - Privilege Escalation (5:56)
Auto Hacking with Armitage - Part 1 (13:37)
Auto Hacking with Armitage - Part 2 (5:43)
Hacking with Kali Linux - Quick recap of favorite tools (5:56)
Part 5: Putting Things Together
Download and build the target (19:03)
Hacking your target system (5:45)
Can You Hack This? (1:42)
Part 6: Shells Used By Good And Bad Guys
Understanding basic web shells (6:35)
Understanding bind shells (8:08)
Understanding reverse shells (1:57)
Quick recap (2:25)
Creating a Metasploit backdoor (11:53)
Bad guy's interactive shell (5:26)
Bad guys web shells (2:56)
Part 7 - Steal The Credit Cards: Hacking Like The Bad Guys
First Mission (3:06)
Port scanning (3:41)
Vulnerability Scanning (2:42)
Vulnerability Scanning Using Nmap (8:18)
Initial Break-in (9:02)
Getting an Interactive Shell (8:58)
Changing SSH config (4:36)
Getting SSH Access (5:08)
Cracking Users' Passwords (7:23)
Attacking Database Authentication (9:03)
Stealing The Credit Card Info (9:03)
Second Mission (8:56)
Part 8: Final Mission
Final Mission (2:41)
Quick recap
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock