Today I am going to start a very interesting series of topics, Hacking with Kali Linux. In this series, I will start from the basics of hacking with Kali Linux and go advance. I will not beat around the bush or discuss crap that’s spammed all around the internet but will share real-life scenarios of hacking.
Who is this series for?
Before I talk about the series that I am going to start, let us briefly talk about who should follow this series.
I know there are so many people out there who are very curious to learn hacking just to hack their partner’s social media account. Well, if you are such a person, please listen to me. Hacking is not about getting into somebody’s personal life and steal their information. It is illegal.
Somebody well said – “We need to talk on the subject of what’s yours and what’s mine.”
So you should not hack information that is not yours.
But if you are a tech enthusiast who wants to make a career as a penetration tester or white-hat hacker, this series can be really a good way to start. So for such enthusiasts, I am creating a page where you can follow the series. You can also follow our social media pages so you get a notification when a new informative article comes out.
What is this series going to be about?
In this series, I will deeply focus on website hacking. I will use Kali Linux, one of the best Linux distributions out there for hacking or penetration testing. For those who have never heard of Kali Linux, you can read this article where Kali Linux tops the list of best penetration testing Linux distributions. Now, what is this series for? In this series, I will show you ways that a hacker can use to get into a website or a server. I will discuss vulnerabilities that hackers can exploit to gain access to a server. I will discuss real-world examples. I will use the tools that hackers use to do bad stuff but we will learn to use those tools for good things.
I also want to mention that it is a weekly series. I will post a new article every Monday.
Clear your doubts before moving forward
If you do not clear your doubts and move further, you will hardly understand later topics. So it is better that you post your questions right below the article and I will try to reply as soon as possible.
Feedback
Throughout the series, if you have any suggestions to make, feel free to comment below this article or use this form to send your feedback.
Interested if help usong all advanved apps in kali lenux on android. Via userland.
Well, why is Kali good for system penetrations? What tools or resources does a hacker wish for, that Kali supplies?
i really would like to follow this,
When is the series pickinig up again?
Hi TJ, Thanks for your interest in the series. It’ll be resumed next month.
I was hacked, please tell me how to remove him from my computer. PLEASE , PLEASE.
The above comments wrong timestamp is due to a bug in the previous theme. Please ignore the timestamps.
I really would like to follow this
Me and my few friends is very excited about your upcoming posts, we want to learn abouts tools out there for penetration testing. Also provide some tips and tricks for a normal user how he/she can use this tools for various other things apart from penetration testing.
Thanks for following. I will definitely try to cover as much practical knowledge as I can. 🙂 Kindly share the articles on your social media pages.
i’m interested in penetration testing as a career and i would much appreciate if you post more about it or help me to find some articles
Thank you a lot