The course will teach you ways to penetrate Kali Linux โ The Linux version is famous among Hackers. When taking this course you will gain the following knowledge:
Join the channel Telegram belong to AnonyViet ๐ Link ๐ |
- Perform basic to advanced tasks in Kali Linux
- Hack your way through multiple objectives on demand
- Learn how white hat hackers, black hat hackers
- Understand how Linux commands are used by hackers
- Build a Linux target from scratch to hack with Kali Linux
The course has been Vietnamese Subbed and is very easy to understand so you can get used to learning Hack on Kali Linux.
The course is divided into three parts.
Part 1 โ Basic concepts
-
Commands to help you navigate any Linux system
-
Add/remove software and update/upgrade your system
-
Archive and compress files and folders
-
Use wildcards to make everyday tasks easier
Part 2 โ Administration
-
Edit files
-
Service configuration and management
-
Manage users, groups, and permissions
-
Become familiar with scripts that affect administrative rights
Part 3 โ Hacking
-
Learn the basics of Linux, and start getting familiar with basic operations.
-
Hack it with Kali Linux!
Part 4 โ Shell
-
Learn about bind shells
-
Learn about reverse shells
-
Learn about web shells
Part 5 โ Hacking Like The Bad Guys
-
Exploit a copy of the actual vulnerability
-
Access and create backdoors
-
Stealing credit card information
Password: anonyviet.com

Instructions for creating a virtual machine to learn Hacking on Kali Linux
I. Necessary configuration for creating a lab
โ 4GB RAM (Can run 1 virtual machine with 2GB RAM and 1 virtual machine with 512MB RAM)
โ BIOS supports Intelยฎ Virtualization Technology (Intelยฎ VT). Most machines support this technology. It's just a matter of whether it's turned on or not
II. Lab components
โ Real machine: Windows/Linux/Mac OS 64bit
โ Attacker: Kali Linux 2016.2 (If the real machine is Kali Linux, ignore this machine)
โ Victim machine (Machine pretending to be a victim)
+ Metasploitable 2 Linux (Linux virtual machine contains many vulnerabilities for testing)
+ Windows 7/8.1/10 virtual machine
+ Windows Server 2008 virtual machine
+ Android x86 virtual machine (Note that it is a virtual machine, not an emulator)
+ Ubuntu virtual machine
III. Download Link
โ VirtualBox: Downloads
โ Kali Linux 2016.2 ISO: https://www.kali.org/downloads/
โ Metasploitable 2 Linux: Download
โ Ready-made Windows 7 virtual machine (Runs smoothly at 512MB RAM): Download
โ ISO of other Windows versions: Downloads
โ Ubuntu: Downloads
โ Android x86: http://www.android-x86.org/download
(Note: In CEH's Lab textbooks, virtual machines are installed on Hyper-V Manager, but I find that quite difficult for beginners and of course when you go to CEH, most virtual machines are already installed. already installed)
IV. Stages of creating virtual machines
Step 1: Set up parameters for the virtual machine
Step 2: Install the operating system of the virtual machine
Step 3: Install virtual machine creator support software (Vmware Tools or Vbox Guest Additon)
V. A few notes
2. After installing the virtual machine, you must install the virtual machine creator's support software (Vmware Tools or Vbox Guest Additon)Some DEMO installation videos for you
https://www.youtube.com/watch?v=yeKWXR-YAw0
Install Kali Linux On VMware
Resources for learning
Please pay attention when watching this course
- You should study on your own computer. Or my noodle machine has full rights
- Learning requires practice. Don't read the theory
- This is a course for educational purposes. And I am not legally responsible for any of your actions
- All penetration attack techniques. It is mandatory to take VIRTUAL MACHINE or YOUR MACHINE as victim. If you use someone else's computer without permission, you are breaking the law
Wishing you happy studying