Learn Ethical Hacking Using Kali Linux Red Team Tactics
Learn Black Hat Hacking with Kali Linux Step-By-Step
What is Ethical Hacking
FREE PREVIEWRed Team Vs Blue Team
Why Kali Linux ?
Booting Up Kali Linux
The Linux Filesystem
Basic Linux Commands
Managing Kali Linux Services
Searching, Installing, and Removing Tools
Environment Variables
Bash History Command
Piping and Redirection
Text Searching and Manipulation
Editing Files
Comparing Files
Managing Processes
File and Command Monitoring
Downloading Files
Customizing the Bash Environment
Netcat (nc)
What is Wireshark and why should you learn it?
Basics of Computer Networking
OSI model
Install Wireshark
WireShark Getting Started
Sets a conversation filter between two specific IP addresses
Sets a filter to display all http and dns protocols
Sets filters for any TCP packet with a specific source or destination port
displays all TCP packets that contain a certain term
filters all HTTP GET and POST requests
filter out certain types of protocols
Can Wireshark capture passwords?
Plain text network protocols
Capture Insecure Connections (Net Cat)
Capture FTP Passwords
Extract files from FTP using Wireshark
Capture HTTP Passwords
Capture files (images) from HTTP traffic
Our First Bash Script
Variables
If, Else, Elif Statements
Loops
Functions