Kali Linux: Tips, Tricks and Techniques

Kali Linux: Tips, Tricks and Techniques

English | MP4 | AVC 1920×1080 | AAC 48KHz 2ch | 2h 04m | 1.68 GB

Proven approaches to secure your system by performing Ethical Hacking & Penetration Testing with Kali Linux

Discover the methods used by famous hackers on Kali Linux to execute different commands for hacking your target while keeping your information secure and private.
You will start this course off by implementing tips for securing and protecting Kali Linux via VPN services, and for setting custom proxy configurations. Then, you will set up a password dictionary, learn to lock onto your target, and perform reconnaissance. Next you will focus on discovering new methods to speed up your Kali Linux machine from hardware upgrades to software configurations. Moving on, you will patch up any security flaws you may have lurking on your Kali machine. And finally you will carry out a full-scale attack from recon work to cracking passwords and gaining access to your target.
By the end of this course, you will have enhanced your hacking abilities with new methods and techniques you can utilize to perform proper ethical hacking.

This is a step-by-step and fast-paced guide will help you learn different techniques you can use to optimize your pentesting time, speed, and results with a practical approach.

What You Will Learn

  • Set up private secured emails for communications.
  • Configure VPN connections and proxy server connections.
  • Verbose-scan your selected target(s)
  • Scan WordPress sites with different tools
  • Cultivate a proper password dictionary
  • Brute-forcing passwords
  • Extract email accounts from websites
  • Launch a Stealth Scan on your target.
  • Identify the best hardware for optimizing Kali Linux
  • Monitor your internet connections
Table of Contents

Privacy and Security
1 The Course Overview
2 Private Email
3 Setting Up VPN Services
4 Configuring Proxy Lists
5 Terminator Terminal

Targeting and Scanning
6 Lock On
7 Verbose Scanning
8 WordPress Scanning
9 Optimized Password Dictionary
10 Learn How to Quickly Brute-Force

Recon Work
11 What Exactly Is Recon
12 DNS Recon Work
13 Extracting Email Accounts
14 Recon-NG
15 Stealth NMapping

Optimizing Kali Linux
16 Hardware Specs
17 Grub Loader
18 Speed Up Nautilus
19 Overclocking GPU

Security Flaws
20 Browser History
21 Ad Blocking
22 TOP Monitoring
23 HTOP Traffic Monitoring
24 Resetting IP Intel

Your First Hack
25 NMap Scanning
26 Code Surfing
27 Enumerate Usernames
28 Cracking Passwords
29 Gaining Access to Site