Kali Linux: Tips, Tricks and Techniques

Kali Linux: Tips, Tricks and Techniques

Proven approaches to secure your system by performing Ethical Hacking & Penetration Testing with Kali Linux

Bestseller
Created By: Paul Olushile
15.87 9.52

About This Course

Discover the methods used by famous hackers on Kali Linux to execute different commands for hacking your target while keeping your information secure and private.

You will start this course off by implementing tips for securing and protecting Kali Linux via VPN services, and for setting custom proxy configurations. Then, you will set up a password dictionary, learn to lock onto your target, and perform reconnaissance. Next you will focus on discovering new methods to speed up your Kali Linux machine from hardware upgrades to software configurations. Moving on, you will patch up any security flaws you may have lurking on your Kali machine. And finally you will carry out a full-scale attack from recon work to cracking passwords and gaining access to your target.

By the end of this course, you will have enhanced your hacking abilities with new methods and techniques you can utilize to perform proper ethical hacking.

Other Information

  • Certificate will provided in this course on Completion
  • Full lifetime access
  • Available on Mobile & Laptop

What Students Will Learn In Your Course?

  • Set up private secured emails for communications.
  • Configure VPN connections and proxy server connections.
  • Verbose-scan your selected target(s)
  • Scan WordPress sites with different tools
  • Cultivate a proper password dictionary
  • Brute-forcing passwords
  • Extract email accounts from websites
  • Launch a Stealth Scan on your target.
  • Identify the best hardware for optimizing Kali Linux
  • Monitor your internet connections

Are There Any Course Requirements Or Prerequisites?

Prior exposure to penetration testing/ethical hacking would be helpful to make the most out of this course.

Who Are Your Target Students?

If you are a penetration tester or a security consultant and want to maximize your network testing using some advanced features of Kali Linux, then this course is for you.

Course Content

  • 29 lectures
  • 02:04:08
  • The Course Overview
    00:05:18
  • Private Email
    00:06:25
  • Setting Up VPN Services
    00:06:06
  • Configuring Proxy Lists
    00:04:23
  • Terminator Terminal
    00:02:32
  • Lock On
    00:03:39
  • Verbose Scanning
    00:01:30
  • WordPress Scanning
    00:04:05
  • Optimized Password Dictionary
    00:05:34
  • Learn How to Quickly Brute-Force
    00:02:14
  • What Exactly Is Recon?
    00:05:32
  • DNS Recon Work
    00:05:46
  • Extracting Email Accounts
    00:05:57
  • Recon-NG
    00:04:27
  • Stealth NMapping
    00:02:55
  • Hardware Specs
    00:06:03
  • Grub Loader
    00:03:12
  • Speed Up Nautilus
    00:02:21
  • Overclocking GPU
    00:04:19
  • Browser History
    00:02:34
  • Ad Blocking
    00:02:19
  • TOP Monitoring
    00:02:34
  • HTOP Traffic Monitoring
    00:06:14
  • Resetting IP Intel
    00:04:58
  • NMap Scanning
    00:05:48
  • Code Surfing
    00:03:11
  • Enumerate Usernames
    00:04:38
  • Cracking Passwords
    00:03:58
  • Gaining Access to Site
    00:05:36
Image

Packt Publication

  • 4.48 (0)
  • 13 Reviews
  • 0 Students
  • 935 Courses