Oreilly - Kali Linux: Tips, Tricks and Techniques
by Paul Olushile, Aubrey Love II | Publisher: Packt Publishing | Release Date: October 2018 | ISBN: 9781789535099
Proven approaches to secure your system by performing Ethical Hacking & Penetration Testing with Kali LinuxAbout This VideoDebug website code in order to view setup functions and determine the website development platform.Secure your Kali Linux OS by using VPNs and proxy services and even set up a custom secured email address you can use.Master scanning techniques used by hackers to perform proper recon work, and then carry out an attack on your target.In DetailDiscover the methods used by famous hackers on Kali Linux to execute different commands for hacking your target while keeping your information secure and private.You will start this course off by implementing tips for securing and protecting Kali Linux via VPN services, and for setting custom proxy configurations. Then, you will set up a password dictionary, learn to lock onto your target, and perform reconnaissance. Next you will focus on discovering new methods to speed up your Kali Linux machine from hardware upgrades to software configurations. Moving on, you will patch up any security flaws you may have lurking on your Kali machine. And finally you will carry out a full-scale attack from recon work to cracking passwords and gaining access to your target.By the end of this course, you will have enhanced your hacking abilities with new methods and techniques you can utilize to perform proper ethical hacking.
- Chapter 1 : Privacy and Security
- The Course Overview 00:05:19
- Private Email 00:06:25
- Setting Up VPN Services 00:06:07
- Configuring Proxy Lists 00:04:23
- Terminator Terminal 00:02:33
- Chapter 2 : Targeting and Scanning
- Lock On 00:03:40
- Verbose Scanning 00:01:31
- WordPress Scanning 00:04:05
- Optimized Password Dictionary 00:05:35
- Learn How to Quickly Brute-Force 00:02:15
- Chapter 3 : Recon Work
- What Exactly Is Recon? 00:05:33
- DNS Recon Work 00:05:47
- Extracting Email Accounts 00:05:57
- Recon-NG 00:04:28
- Stealth NMapping 00:02:56
- Chapter 4 : Optimizing Kali Linux
- Hardware Specs 00:06:03
- Grub Loader 00:03:13
- Speed Up Nautilus 00:02:21
- Overclocking GPU 00:04:19
- Chapter 5 : Security Flaws
- Browser History 00:02:35
- Ad Blocking 00:02:20
- TOP Monitoring 00:02:35
- HTOP Traffic Monitoring 00:06:15
- Resetting IP Intel 00:04:58
- Chapter 6 : Your First Hack
- NMap Scanning 00:05:49
- Code Surfing 00:03:11
- Enumerate Usernames 00:04:39
- Cracking Passwords 00:03:58
- Gaining Access to Site 00:05:37
TO MAC USERS: If RAR password doesn't work, use this archive program:
RAR Expander 0.8.5 Beta 4 and extract password protected files without error.
TO WIN USERS: If RAR password doesn't work, use this archive program:
Latest Winrar and extract password protected files without error.