Course curriculum
-
1
Section 1: Welcome
-
Welcome to the Course
-
-
2
Section : Before You Install Kali
-
root User In Kali 2020
-
Linux Desktop Environments
-
-
3
Section 4 : Building the Foundation
-
Kali Linux Terminal
-
Getting the first shell!
-
Kali Linux Terminal Shortcuts
-
Kali Linux root, root and root
-
Basics Of Commands
-
Navigating directories
-
Creating directories
-
Listing directory contents
-
Copying files and directories
-
Moving files and directories
-
Adding or removing software and updating or upgrading your system
-
Understanding where software on Kali Linux comes from
-
APT changes in Kali Linux 2018
-
Archiving files and directories
-
Using wildcards to speed up tasks
-
How to get help when needed
-
-
4
Part 2 Administration
-
Networking basics on Kali Linux
-
How to edit files with nano
-
Turning your Kali Linux into a Web Server
-
Configuration file changes in Kali Linux
-
Turning your Kali Linux into an SSH
-
Managing users and groups
-
Maintaining permissions of users
-
Understanding processes
-
Managing processes
-
Command redirection and controlling output
-
Chaining multiple commands together
-
End of Part 2
-
-
5
Part 3 hacking with kali linux
-
Set up your target
-
Port scanning with Kali Linux
-
Port scanning using Kali Linux graphical interface
-
Hacking with Kali Linux - FTP hacking
-
Vulnerability scanning with Kali Linux
-
Hacking with Kali Linux - SSH hacking
-
Hacking with Kali Linux - Web service hacking
-
Hacking with Kali Linux - Database hacking and password attacks
-
Hacking With Kali Linux - Password Cracking
-
Hacking with Kali Linux - Sniffing
-
Hacking with Kali Linux - Privilege Escalation
-
Auto Hacking with Armitage - Part 1
-
Auto Hacking with Armitage - Part 2
-
Hacking with Kali Linux - Quick recap of favorite tools
-
Download and build the target
-
Hacking with Kali Linux your target system
-
Can You Hack This
-
-
6
Part 4 shells used by good and Bad Guys
-
Understanding basic web shells
-
Understanding bind shells
-
Understanding reverse shells
-
Quick recap
-
Creating a Metasploit backdoor
-
Bad guy_s interactive shell
-
Bad guys web shells
-
-
7
Part 5 steal the Credit Cards Hacking Like the Bad guy
-
First Mission
-
Port scanning
-
Vulnerability Scanning
-
Vulnerability Scanning Using Nmap
-
Initial Break-in
-
Getting an Interactive Shell
-
Changing SSH config
-
Getting SSH Access
-
Cracking User's Passwords
-
Attacking Database Authentication
-
Stealing The Credit Card Info
-
Second Mission
-
-
8
Final Mission
-
whats next
-