Kali Linux Hacking

Kali Linux is an open-source, Debian-based Linux distribution geared towards various information security tasks, such as Penetration Testing, Security Research, Computer Forensics and Reverse Engineering.

Beginner 0(0 Ratings) 1 Students enrolled English
Created by skill expert
Last updated Tue, 17-May-2022
+ View more
Course overview
Curriculum for this course
120 Lessons 18:07:04 Hours
What is Ethical hacking and Penetration testing
2 Lessons 00:13:39 Hours
  • Introduction Part 1
    Preview 00:05:34
  • Introduction Part 2
    00:08:05
Installation and Configuration
7 Lessons 01:06:25 Hours
  • Kali Linux
    00:11:07
  • Operating systems_part 01
    00:05:58
  • Operating systems_part 02
    00:09:21
  • Installing Operating Systems
    00:08:59
  • Installing vmware tools
    00:10:22
  • Configuring Kali Linux
    00:09:21
  • Installing Kali Linux on MacBook
    00:11:17
Footprinting and Reconnaissance
7 Lessons 01:04:40 Hours
  • What is Foot printing
    00:10:20
  • Foot printing Objectives
    00:09:15
  • Foot printing Tools
    00:12:23
  • Google Hacking part 1
    00:08:50
  • Google Hacking part 2
    00:07:00
  • Google Hacking further continued
    00:06:38
  • WhOIS lookup
    00:10:14
Phishing Attacks
8 Lessons 01:07:02 Hours
  • DNS foot printing_part 01
    00:06:46
  • DNS footprinting_part 02
    00:07:03
  • Determining Operation System
    00:09:41
  • Phishing Attacks_part 01
    00:07:25
  • Phishing Attacks_part 02
    00:06:19
  • Connecting information database
    00:12:02
  • N map and Zen Map
    00:10:18
  • Nmap and Zen Map continued
    00:07:28
Social Engineering and information Gathering
9 Lessons 01:07:41 Hours
  • N map and Zen Map further continued
    00:07:28
  • The Harvester Part 1
    00:06:33
  • The Harvester Part 2
    00:05:59
  • WHOIS and dns enum Part 1
    00:07:48
  • WHOIS and dns enum Part 2
    00:07:17
  • Url crazy and dns dict6 Part 1
    00:06:24
  • Url crazy and dns dict6 Part2
    00:05:45
  • Dns recon
    00:09:21
  • Dns mapping
    00:11:06
Social Engineering
7 Lessons 01:01:24 Hours
  • Introduction
    00:09:45
  • Types of Social Engineering
    00:09:56
  • Social Engineering attacks
    00:07:06
  • Spear-phishing Attack
    00:11:10
  • Phishing Attack Part 1
    00:07:02
  • Phishing Attack Part 2
    00:07:01
  • Mass mailer Attack
    00:09:24
Trojans and Backdoors
10 Lessons 01:12:11 Hours
  • Types of Computer Malwares Part 1
    00:06:42
  • Types of Computer Malwares Part 2
    00:07:53
  • Dangerous viruses of all time Part 1
    00:07:33
  • Dangerous viruses of all time Part 2
    00:07:53
  • Installing Rootkit Hunter
    00:06:44
  • command prompt backdoor Part 1
    00:07:07
  • Command prompt backdoor Part 2
    00:06:36
  • Backdoor & Gaining Access
    00:09:04
  • Backdoor & Maitaining Access Part 1
    00:07:15
  • Backdoor & Maitaining Access Part 2
    00:05:24
Meterpreter Commands
8 Lessons 01:22:43 Hours
  • Command prompt backdoor continued
    00:08:00
  • Command prompt backdoor further continued
    00:07:09
  • Meterpreter Backdoor
    00:10:55
  • I am Root
    00:13:50
  • Forensic escaping
    00:06:58
  • Hacking win7 SAM database
    00:11:33
  • Jack the ripper
    00:11:39
  • Meterpreter commands
    00:12:39
DNS Spoofing
10 Lessons 01:39:25 Hours
  • PDF embedded Trojan Horse
    00:11:20
  • Java Applet Attack Method_part01
    00:06:37
  • Java Applet Attack Method_part 02
    00:08:08
  • MITM Attack
    00:09:31
  • DNS spoofing vs DNS poisoning
    00:08:19
  • DNS spoofing
    00:09:59
  • DNS spoofing continued
    00:10:47
  • DHCP Spoofing
    00:12:26
  • Port Stealing
    00:11:22
  • ARP spoofing
    00:10:56
ICMP Redirection
8 Lessons 01:18:10 Hours
  • ICMP redirection
    00:10:15
  • ICMP redirection part 2
    00:10:15
  • ICMP redirection part 3
    00:09:53
  • Killing a Network
    00:10:48
  • D dosing un authorised Network
    00:08:54
  • Driftnet
    00:09:52
  • EvilGrade
    00:09:27
  • EvilGrade continued
    00:08:46
Denial of Service Attack
6 Lessons 00:53:44 Hours
  • Introduction to DoS
    00:09:32
  • DoS vs DDoS
    00:06:30
  • Levels of Ddos Attacks
    00:08:11
  • Preventing DDoS Attacks
    00:09:06
  • DDoSing Windows 7 method 1
    00:10:38
  • DDoSing Windows 7 method 2
    00:09:47
Hacking Android
3 Lessons 00:24:24 Hours
  • Hacking through Android part_1
    00:06:02
  • Hacking through Android part_2
    00:06:50
  • Hacking Android via Kali Linux
    00:11:32
Password Cracking
10 Lessons 01:37:06 Hours
  • Introduction to Password Cracking
    00:11:34
  • Password cracking Strategy
    00:11:48
  • Password cracking Strategy..continued
    00:09:52
  • Windows Password cracking_part 01
    00:08:05
  • Windows Password cracking_part 02
    00:07:19
  • Linux Hash Cracking
    00:08:55
  • Linux Hash Cracking continued
    00:12:52
  • Generating word list
    00:07:33
  • Generating word list continued
    00:10:18
  • CeWL cracking
    00:08:50
Wireless Hacking
5 Lessons 00:46:43 Hours
  • WEP and WPA
    00:09:39
  • WPA2
    00:10:34
  • 1X standard
    00:08:40
  • Wireless cracking via Kali
    00:08:52
  • Wireless cracking via Kali continued
    00:08:58
Meterpreter
2 Lessons 00:23:21 Hours
  • Activating payloads
    00:14:15
  • Activating payloads continued
    00:09:06
Metasploit
6 Lessons 01:07:59 Hours
  • Msf console explained
    00:12:01
  • Msf console commands
    00:11:54
  • Exploits
    00:11:39
  • Payloads
    00:09:54
  • Generating payloads
    00:10:50
  • Generating payloads continued
    00:11:41
SQL injection
4 Lessons 00:38:27 Hours
  • Intro to SQL injection
    00:07:52
  • SQL injection to google dorks
    00:11:27
  • SQL mapping via Kali Linux
    00:09:56
  • Gathering Password and cracking the hash
    00:09:12
Cryptography
5 Lessons 00:39:58 Hours
  • Introduction_part 01
    00:05:24
  • Introduction_part 02
    00:07:12
  • Hash Func and Oracle Method
    00:09:35
  • Birthday Theorem and Digital Signature
    00:09:36
  • Pros and Cons of Cryptography
    00:08:11
Metasploit Database
3 Lessons 00:22:02 Hours
  • Importing Databases
    00:09:05
  • Exporting Databases_part01
    00:07:17
  • Exporting Databases_part02
    00:05:40
+ View more
Other related courses
01:51:15 Hours
Updated Tue, 17-May-2022
0 0 Free
01:43:29 Hours
0 1 Free
15:06:52 Hours
Updated Wed, 08-Jun-2022
0 0 Free
14:55:05 Hours
Updated Wed, 08-Jun-2022
0 0 Free
About instructor

skill expert

0 Reviews | 17 Students | 467 Courses
Student feedback
0
0 Reviews
  • (0)
  • (0)
  • (0)
  • (0)
  • (0)

Reviews

Free
Includes: