Kali Linux Deep Dive

By Ermin

Learn the ins and outs of security from a hacker's perspective.

19.4 hours
  • 102 Lessons

About the course

Welcome to the Kali Linux Deep Dive course! This course is intended for individuals who already possess general IT knowledge, so be sure to read the list of prerequisites before you get started. Throughout the course, we will dive into the nature of hacking at the hardware level. This is how virtually all vulnerabilities were discovered — by individuals combing through source code or reverse engineering binaries.

This is what sets this course apart from the many others like it. In this course, you will learn how the vulnerabilities in frameworks like Metasploit, BeEF, SET, and others are found so that you will be able to deconstruct a program instead of just trying to figure out how to use something other people wrote. We’ll also cover subjects such as anonymity online and tackle the common misconception that VPN services guarantee anonymity. You’ll learn how to set up and operate your own anonymizing services instead.

In the Social Engineering section of the course, you will learn how to think like a hacker. This is extremely important, as your behavior and thought process determine whether you are an easy target for attacks or a serious cybersecurity specialist no one wants to mess with.

After finishing this course, you will have learned quite a bit, and, at some point, you will most likely have questions. I am always here to help so feel free to reach out and let me guide you on your way to becoming an expert white hat hacker.

Here are the Kali Linux Deep Dive Interactive Guides:

Pt 1 – DOS
https://www.lucidchart.com/documents/view/9837c4e4-a254-4f55-be89-589836ce15cf/0

Pt 2 – Reverse Engineering
https://interactive.linuxacademy.com/diagrams/KaliLinux2.html

Pt 3 – Buffer Overflow
https://interactive.linuxacademy.com/diagrams/KaliLinux3.html

Pt 4 – Password Cracking
https://interactive.linuxacademy.com/diagrams/KaliLinux4.html

Pt 5 – Metasploit
https://interactive.linuxacademy.com/diagrams/KaliLinux5.html

Pt 6 – SQL Injection
https://interactive.linuxacademy.com/diagrams/KaliLinuxpt6.html

Pt 7 – VPNs
https://interactive.linuxacademy.com/diagrams/KaliLinux7.html

Pt 8 – Proxies
https://interactive.linuxacademy.com/diagrams/KaliLinux8.html

Pt 9 – Tor
https://interactive.linuxacademy.com/diagrams/KaliLinux9.html

Pt 10 – Email Phishing and Tracking
https://interactive.linuxacademy.com/diagrams/KaliLinux10.html

  • Chapter 1 6 Lessons Getting Started 20:37

    An Important Note About A Cloud Guru and Linux Academy Courses

    1:19

    About the Author

    1:45

    About the Course

    3:14

    Course Prerequisites

    5:30

    Community and Support

    4:08

    Disclaimer: It Is Not Like in the Movies!

    4:41
  • Chapter 2 3 Lessons Basics and Orientation 43:09

    What Is What

    12:05

    Where Is What

    14:19

    Linux Command Line Review

    16:45
  • Chapter 3 3 Lessons System Controls 29:33

    Services

    11:32

    Firewalls

    10:06

    Users

    7:55
  • Chapter 4 8 Lessons Creating a Kali Linux Live USB 1:02:36

    Introduction

    3:12

    Installing Kali Linux — Part 1

    12:43

    Installing Kali Linux — Part 2

    1:49

    Building a Custom Kali Linux Image

    13:53

    Creating a Live USB

    4:11

    Booting from a Live USB

    4:25

    Adding Encrypted Persistent Storage

    8:49

    Finalizing and Testing the Live USB

    13:34
  • Chapter 5 2 Lessons Introduction 33:41

    What Is Social Engineering?

    15:35

    Don't Be an Easy Target!

    18:06
  • Chapter 6 4 Lessons Social Engineering Attacks 34:16

    Circles of Trust

    8:15

    Keyloggers

    8:31

    ATMs and Banks

    5:19

    Physical Access to Devices

    12:11
  • Chapter 7 2 Lessons Introduction 24:13

    Real Anonymity vs. Perceived Anonymity

    11:42

    Common Pitfalls

    12:31
  • Chapter 8 6 Lessons Virtual Private Networks (VPNs) 1:11:24

    What Is a VPN?

    9:51

    Setting Up a VPN: Server Side — Part 1

    13:59

    Setting Up a VPN: Server Side — Part 2

    15:37

    Setting Up a VPN: Server Side — Part 3

    11:53

    Setting Up a VPN: Client Side

    14:28

    Connecting to a VPN

    5:36
  • Chapter 9 3 Lessons Tor 41:09

    What Is Tor?

    11:13

    Tor Browser

    16:02

    The Tor Service

    13:54
  • Chapter 10 3 Lessons Proxies 33:03

    What Is a Proxy?

    5:07

    Setting Up a SOCKS5 Proxy

    16:24

    Connecting to a Proxy

    11:32
  • Chapter 11 3 Lessons Email Phishing and Tracking 32:22

    Introduction to Phishing and Tracking

    5:49

    Setting Up Email Tracking

    10:42

    Let's Go Phishing!

    15:51
  • Chapter 12 3 Lessons Spoofing Techniques 37:26

    ARP Spoofing

    18:40

    MAC Address Spoofing

    8:12

    DHCP Starvation

    10:34
  • Chapter 13 9 Lessons Scanning Techniques 1:44:02

    Google Dorks

    10:56

    WHOIS and GeoIP Lookup

    10:47

    Nmap

    11:00

    Host Discovery

    10:47

    Open Port Discovery

    16:49

    Network Mapping

    14:22

    Service and Service Version Detection

    5:48

    Identifying the Operating System

    7:09

    Vulnerability Scans

    16:24
  • Chapter 14 2 Lessons DoS/DDoS Attacks 17:41

    What Are DoS and DDoS Attacks?

    9:45

    Famous DDoS Attacks

    7:56
  • Chapter 15 5 Lessons Let's Get Cracking! 1:10:28

    Scanning Networks, Capturing a Handshake, and Deauthenticating Clients

    16:44

    Password Cracking: Math, Common Sense, and Limits

    10:02

    Setting Up the Environment and Installing GPU Drivers

    15:19

    Using Hashcat and Password Masks

    21:09

    Hashcat Wrap-Up

    7:14
  • Chapter 16 2 Lessons Buffer Overflow 25:57

    What Is Buffer Overflow?

    11:34

    Using Buffer Overflow to Bypass Authentication

    14:23
  • Chapter 17 1 Lesson Introduction to Reverse Engineering 10:01

    What Is Reverse Engineering?

    10:01
  • Chapter 18 4 Lessons Customizing and Compiling a Keylogger 31:41

    Setting Up an IDE to Compile a Keylogger

    7:12

    Getting, Importing, and Compiling the Source Code

    7:21

    Compiling and Customizing the Source Code

    12:26

    Testing Out the Keylogger

    4:42
  • Chapter 19 14 Lessons Analyzing and Reverse Engineering an Executable 3:13:45

    Detecting Process Abnormalities in the Task Manager

    17:55

    Analyzing Processes with Cheat Engine

    17:46

    Determining What an Unknown Program Is Doing — Part 1

    17:07

    Determining What an Unknown Program Is Doing — Part 2

    11:21

    Analyzing an Executable with a Decompiler

    16:17

    Decompiling Function Parameters and Variables

    14:00

    Reverse Engineering Function Logic with a Decompiler — Part 1

    16:03

    Reverse Engineering Function Logic with a Decompiler — Part 2

    12:04

    Reverse Engineering Function Logic with a Decompiler — Part 3

    16:03

    Finding Salts in Decompiled Code

    14:42

    Writing a Decryption Program from Pseudocode — Part 1

    15:02

    Writing a Decryption Program from Pseudocode — Part 2

    15:09

    Writing a Decryption Program from Pseudocode — Part 3

    4:53

    Reverse Engineering Wrap-Up

    5:23
  • Chapter 20 18 Lessons The Metasploit Framework 4:02:47

    What Is Metasploit?

    13:04

    Basic Commands

    16:34

    Other Useful Metasploit Commands

    12:24

    Database Setup and ExploitDB

    13:20

    Exploit Usage

    7:52

    The Post-Exploitation Phase

    11:48

    Armitage

    14:24

    Shellshock

    12:55

    Executing Code Remotely with Shellshock

    14:25

    Writing an NSE Script: Headers

    13:56

    Writing an NSE Script: Rules

    15:00

    Writing an NSE Script: Actions

    16:06

    Debugging an NSE Script — Part 1

    17:22

    Debugging an NSE Script — Part 2

    7:00

    Examining a Metasploit Module

    15:57

    Module Script Outline

    12:47

    Loading a Module into Metasploit and Performing a Syntax Check

    9:59

    Deploying and Testing a Script

    17:54
  • Chapter 21 1 Lesson Final Steps 4:47

    What's Next?

    4:47

Practice alongside courses in Cloud Playground

What is Cloud Playground? Cloud Playground lets you build skills in real-world AWS, Google Cloud, and Azure environments. Spin up risk-free Sandboxes, Servers and Terminals and follow along with courses, test a new idea or prepare for exams.

Get Started
Who’s going to be learning?
Sign In
Welcome Back!

Psst…this one if you’ve been moved to ACG!