{"id":7281,"date":"2020-08-10T01:30:06","date_gmt":"2020-08-10T01:30:06","guid":{"rendered":"https:\/\/oxhosting.com\/blog\/2020\/08\/10\/kali-linux-101\/"},"modified":"2020-08-10T01:30:06","modified_gmt":"2020-08-10T01:30:06","slug":"kali-linux-101","status":"publish","type":"post","link":"https:\/\/oxhosting.com\/blog\/2020\/08\/10\/kali-linux-101\/","title":{"rendered":"Kali Linux 101"},"content":{"rendered":"<p><iframe loading=\"lazy\"  width=\"580\" height=\"385\" src=\"https:\/\/www.youtube.com\/embed\/o-ckD2KRbHY?rel=0&#038;cc_load_policy=1&#038;modestbranding=1\" frameborder=\"0\" allowfullscreen><\/iframe><br \/>\n<br \/>Kali is a penetration testing Linux distribution produced by Offensive Stability. It holds a repository of a number of instruments for stability-related engineers like hacking wireless networks, internet programs, databases, Reverse engineering, password crackers, and substantially a lot more! So as you can see, Kali is a multipurpose and highly effective software for any one on the lookout to do any cybersecurity-connected work.<\/p>\n<p>As indicated by the \u2018101\u2019 in the class title, this training course is a beginner\u2019s guide to receiving started in Kali\u2026to get your feet soaked. The class is damaged down into 3 sections Finding began, Essential Configuration, and Applications overview. We initial give you an overview of Kali and its use instances then offer you a step-by-stage walkthrough of setting up Kali making use of VMware. Upcoming, we teach you some significant configuration settings in the distribution such as configuring your community and running services in Kali. Being aware of these techniques will assist you established up the correct environments when working with Kali and its instruments. At last, we go above the prime offered in Kali and describe their prime functions and best use instances.<\/p>\n<p>By the end of this study course, you will be in a position to have a fully working distribution, Kali, working on your device. You will also have an knowing of the Linux atmosphere and how to handle network and method products and services. And lastly, you will have a essential overview of the leading resources accessible in Kali.<\/p>\n<p>Topics:<\/p>\n<p>About Kali and use scenarios<br \/>\nPutting in and configuring Kali on a VMware Virtual Device<br \/>\nConfiguring the network adapter<br \/>\nBooting Kali for the very first time<br \/>\nPrimary commands with Kali and VMware<br \/>\nEssential Kali Configuration<br \/>\nConfiguring your network<br \/>\nRequesting and Configuring IP Addresses<br \/>\nRunning products and services in Kali<br \/>\nRunning Apache in Kali<br \/>\nTaking care of SSH in Kali<br \/>\nControlling MySQL in Kali<br \/>\nVulnerability Investigation Applications Overview<br \/>\nTools Overview<br \/>\nData Accumulating Resources Overview<br \/>\nMaltego<br \/>\nWeb Purposes Applications Overview<br \/>\nBurp Suite<br \/>\nPassword Attacks Tools Overview<br \/>\nOphcrack<br \/>\nArmitage<br \/>\nBest 10 Security Instruments Overview<br \/>\nHacking WEP Wi-fi Passwords<br \/>\nReward **Price reduction Discount codes**<\/p>\n<p>Made by CyberTraining 365<\/p>\n<p>Class Url:<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kali is a penetration testing Linux distribution produced by Offensive Stability. It holds a repository of a number of instruments for stability-related engineers like hacking&#8230;<\/p>\n","protected":false},"author":200,"featured_media":7282,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[2],"tags":[1703,2328,1871,1709,1368,2329,2333,70,1362,269,2331,229,2332,2330],"_links":{"self":[{"href":"https:\/\/oxhosting.com\/blog\/wp-json\/wp\/v2\/posts\/7281"}],"collection":[{"href":"https:\/\/oxhosting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/oxhosting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/oxhosting.com\/blog\/wp-json\/wp\/v2\/users\/200"}],"replies":[{"embeddable":true,"href":"https:\/\/oxhosting.com\/blog\/wp-json\/wp\/v2\/comments?post=7281"}],"version-history":[{"count":0,"href":"https:\/\/oxhosting.com\/blog\/wp-json\/wp\/v2\/posts\/7281\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/oxhosting.com\/blog\/wp-json\/wp\/v2\/media\/7282"}],"wp:attachment":[{"href":"https:\/\/oxhosting.com\/blog\/wp-json\/wp\/v2\/media?parent=7281"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/oxhosting.com\/blog\/wp-json\/wp\/v2\/categories?post=7281"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/oxhosting.com\/blog\/wp-json\/wp\/v2\/tags?post=7281"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}