Course 27 - Hacking Web Applications, Penetration Testing, CTF | Episode 1: Kali Linux Essentials
In this lesson, you’ll learn about:
Kali Linux, a Unix-like operating system designed for penetration testing and security assessments, preloaded with hundreds of specialized tools.
Deployment options, including full hard drive installation, portable live USB/CD for field testing, and virtualized environments such as VMware Workstation for safe lab setups.
System maintenance best practices, using apt update and apt upgrade to keep tools, dependencies, and security patches current for optimal performance and stability.
Information gathering tools, including network and port scanning with Nmap and OSINT and relationship mapping with Maltego.
Sniffing and spoofing utilities, such as packet analysis with Wireshark, credential interception with Responder, and MAC address modification tools.
Web application analysis frameworks, including proxy-based testing with Burp Suite and vulnerability detection using sqlmap and Nikto.
Password and wireless attack tools, featuring cracking utilities like John the Ripper, Hashcat, Hydra, and wireless auditing with Aircrack-ng.
Exploitation and post-exploitation frameworks, particularly Metasploit, used for launching exploits, maintaining access, and performing controlled post-compromise activities in authorized testing environments.
Practical navigation skills, encouraging hands-on exploration of categorized toolsets to build familiarity with their capabilities and appropriate use cases.
You can listen and download our episodes for free on more than 10 different platforms: https://linktr.ee/cybercode_academy
Course 27 - Hacking Web Applications, Penetration Testing, CTF | Episode 1: Kali Linux Essentials
In this lesson, you’ll learn about:
Kali Linux, a Unix-like operating system designed for penetration testing and security assessments, preloaded with hundreds of specialized tools.
Deployment options, including full hard drive installation, portable live USB/CD for field testing, and virtualized environments such as VMware Workstation for safe lab setups.
System maintenance best practices, using apt update and apt upgrade to keep tools, dependencies, and security patches current for optimal performance and stability.
Information gathering tools, including network and port scanning with Nmap and OSINT and relationship mapping with Maltego.
Sniffing and spoofing utilities, such as packet analysis with Wireshark, credential interception with Responder, and MAC address modification tools.
Web application analysis frameworks, including proxy-based testing with Burp Suite and vulnerability detection using sqlmap and Nikto.
Password and wireless attack tools, featuring cracking utilities like John the Ripper, Hashcat, Hydra, and wireless auditing with Aircrack-ng.
Exploitation and post-exploitation frameworks, particularly Metasploit, used for launching exploits, maintaining access, and performing controlled post-compromise activities in authorized testing environments.
Practical navigation skills, encouraging hands-on exploration of categorized toolsets to build familiarity with their capabilities and appropriate use cases.
You can listen and download our episodes for free on more than 10 different platforms: https://linktr.ee/cybercode_academy