Kali Linux - The Complete Guide
Kali Linux is one of the distributions of the Linux Operating System. The Kali OS focuses on the penetration of the system and offensive cyber securities.
Kali Linux is an open-source project that is maintained and funded by Offensive Security, a provider of world-class information security training and penetration testing services. In addition to Kali Linux, Offensive Security also maintains the Exploit Database and the free online course, Metasploit Unleashed.
Download First the Kali: DOWNLOAD HERE
Kali Complete Training Program from Scratch (Videos)
Do not jump from one module to another if you still didn't get the last module. Understand carefully and always remember to be quiet and be still.1. Introduction
2. Installation and Configuration
3. Footprinting and Reconnaisance
4. Harvester, WHO, DNS, URL
5. Social Engineering and information Gathering
6. Trojans and Computer Malwares
7. Trojans and Backdoors
8. Advanced Concepts on Trojans and Computer Malwares
9. DNS spoofing vs DNS poisoning
10. ICMP Redirection
11. Trojans, Networks and EvilGrade
12. Denial of Service Attack
13. Ethical häçking and Penetration testing
14. Password Cracking
15. Wireless häçking
16. Meterpreter
17. Metasploit
18. SQL injection
19. Cryptography
20. Metasploit Database
Note: Please be responsible for everything you learn. Do not use in îllégâl concept.