Hacker School

  Hyderabad: +91-9618070760, +91-40-42224138  |  Bangalore: +91-9900343000, +91-80-42024031
                 
  • FacebookTwitterGoogle+

Kali Linux Course

training hacking course and backtrack trainingKali Linux is an operating system based on the Debian distribution aimed at digital forensics and penetration testing use. Kali Linux provides users with easy access to a comprehensive and large collection of security-related tools ranging from port scanners to password crackers. Support for Live CD and Live USB functionality allows users to boot Kali Linux directly from portable media without requiring installation, though permanent installation to hard disk is also an option.

 

Kali Linux includes many well known security tools including:

  • Metasploit Community Version integration
  • Kismet Wireless Pentesting Tool
  • Nmap (A powerful PortScanner)
  • Ophcrack (A Password Cracker)
  • Ettercap (A Network Sniffer)
  • Wireshark (Industry Standard Packet Analyser)
  • BeEF (Browser Exploitation Framework)
  • Hydra (Password Cracker Used By Hackers)
  • Cisco OCS Mass Scanner A very reliable and fast scanner for Cisco routers with telnet/enable default password.
  • A large collection of exploits as well as more commonplace software such as browsers.

 

Kali Linux arranges tools into following categories:

  • Information Gathering
  • Vulnerability Analysis
  • Web Application Analysis
  • Database Assessment
  • Password Attacks
  • Wireless Attacks
  • Reverse Engineering
  • Exploitation Tools
  • Sniffing & Spoofing
  • Post Exploitation
  • Forensics
  • Reporting Tools
  • Social Engineering Tools
  • System Services

 

As Provided you will learn in class Using Kali linux how to perform

  • Collecting Information
  • Performing Vulnerability Scans
  • Hacking Computers
  • Hacking Databases
  • Hacking Web Apps
  • Hacking Wireless Networks such as WIFI
  • Sniffing Networks for Passwords and Sessions
  • Phishing Attacks using Social Engineering and other techniques
  • Making Viruses Undetectable
  • Harddisk Encryption
  • Spoofing
  • DOSsing on Networks and Computers to make them suffer
  • Creating Trojans to Spy on others
  • Creating Viruses to Destroy Others computer or data
  • Creating your owncloud storage device and protecting it

 

Protecting Your self From all the above attacks with

  • Configuring Firewall Custom Advanced Rules
  • Putting an IDS infornt of you to detect malicious attack attempts
  • Implementing Honeypots to trap Hackers
You are here: Home Courses Kali Linux
Quick Inquiry Form