Kali Linux - The Complete Guide


Kali Linux is one of the distributions of the Linux Operating System. The Kali OS focuses on the penetration of the system and offensive cyber securities. 

Kali Linux is an open-source project that is maintained and funded by Offensive Security, a provider of world-class information security training and penetration testing services. In addition to Kali Linux, Offensive Security also maintains the Exploit Database and the free online course, Metasploit Unleashed.

Download First the Kali:  DOWNLOAD HERE 

Kali Complete Training Program from Scratch (Videos)​

Do not jump from one module to another if you still didn't get the last module. Understand carefully and always remember to be quiet and be still.

1. Introduction

2. Installation and Configuration

3. Footprinting and Reconnaisance

4. Harvester, WHO, DNS, URL

5. Social Engineering and information Gathering

6. Trojans and Computer Malwares

7. Trojans and Backdoors

8. Advanced Concepts on Trojans and Computer Malwares

9. DNS spoofing vs DNS poisoning

10. ICMP Redirection

11. Trojans, Networks and EvilGrade

12. Denial of Service Attack

13. Ethical häçking and Penetration testing

14. Password Cracking

15. Wireless häçking

16. Meterpreter

17. Metasploit

18. SQL injection

19. Cryptography

20. Metasploit Database

Note: Please be responsible for everything you learn. Do not use in îllégâl concept.

Popular Posts