Course curriculum

  • 1

    Section 1: Welcome

    • Welcome to the Course

  • 2

    Section : Before You Install Kali

    • root User In Kali 2020

    • Linux Desktop Environments

  • 3

    Section 4 : Building the Foundation

    • Kali Linux Terminal

    • Getting the first shell!

    • Kali Linux Terminal Shortcuts

    • Kali Linux root, root and root

    • Basics Of Commands

    • Navigating directories

    • Creating directories

    • Listing directory contents

    • Copying files and directories

    • Moving files and directories

    • Adding or removing software and updating or upgrading your system

    • Understanding where software on Kali Linux comes from

    • APT changes in Kali Linux 2018

    • Archiving files and directories

    • Using wildcards to speed up tasks

    • How to get help when needed

  • 4

    Part 2 Administration

    • Networking basics on Kali Linux

    • How to edit files with nano

    • Turning your Kali Linux into a Web Server

    • Configuration file changes in Kali Linux

    • Turning your Kali Linux into an SSH

    • Managing users and groups

    • Maintaining permissions of users

    • Understanding processes

    • Managing processes

    • Command redirection and controlling output

    • Chaining multiple commands together

    • End of Part 2

  • 5

    Part 3 hacking with kali linux

    • Set up your target

    • Port scanning with Kali Linux

    • Port scanning using Kali Linux graphical interface

    • Hacking with Kali Linux - FTP hacking

    • Vulnerability scanning with Kali Linux

    • Hacking with Kali Linux - SSH hacking

    • Hacking with Kali Linux - Web service hacking

    • Hacking with Kali Linux - Database hacking and password attacks

    • Hacking With Kali Linux - Password Cracking

    • Hacking with Kali Linux - Sniffing

    • Hacking with Kali Linux - Privilege Escalation

    • Auto Hacking with Armitage - Part 1

    • Auto Hacking with Armitage - Part 2

    • Hacking with Kali Linux - Quick recap of favorite tools

    • Download and build the target

    • Hacking with Kali Linux your target system

    • Can You Hack This

  • 6

    Part 4 shells used by good and Bad Guys

    • Understanding basic web shells

    • Understanding bind shells

    • Understanding reverse shells

    • Quick recap

    • Creating a Metasploit backdoor

    • Bad guy_s interactive shell

    • Bad guys web shells

  • 7

    Part 5 steal the Credit Cards Hacking Like the Bad guy

    • First Mission

    • Port scanning

    • Vulnerability Scanning

    • Vulnerability Scanning Using Nmap

    • Initial Break-in

    • Getting an Interactive Shell

    • Changing SSH config

    • Getting SSH Access

    • Cracking User's Passwords

    • Attacking Database Authentication

    • Stealing The Credit Card Info

    • Second Mission

  • 8

    Final Mission

    • whats next