Hacking with Kali Linux

Ethical Hacking With Kali Linux

​Today I am going to start a very interesting series of topics, Hacking with Kali Linux. In this series, I will start from the basics of hacking with Kali Linux and go advance. I will not beat around the bush or discuss crap that’s spammed all around the internet but will share real-life scenarios of hacking.

Who is this series for?

Before I talk about the series that I am going to start, let us briefly talk about who should follow this series.

I know there are so many people out there who are very curious to learn hacking just to hack their partner’s social media account. Well, if you are such a person, please listen to me. Hacking is not about getting into somebody’s personal life and steal their information. It is illegal.

Somebody well said – “We need to talk on the subject of what’s yours and what’s mine.”

So you should not hack information that is not yours.

​But if you are a tech enthusiast who wants to make a career as a penetration tester or white-hat hacker, this series can be really a good way to start. So for such enthusiasts, I am creating a page where you can follow the series. You can also follow our social media pages so you get a notification when a new informative article comes out.

What is this series going to be about?

In this series, I will deeply focus on website hacking. I will use Kali Linux, one of the best Linux distributions out there for hacking or penetration testing. For those who have never heard of Kali Linux, you can read this article where Kali Linux tops the list of best penetration testing Linux distributions. Now, what is this series for? In this series, I will show you ways that a hacker can use to get into a website or a server. I will discuss vulnerabilities that hackers can exploit to gain access to a server. I will discuss real-world examples. I will use the tools that hackers use to do bad stuff but we will learn to use those tools for good things.

​I also want to mention that it is a weekly series. I will post a new article every Monday.

Clear your doubts before moving forward

​If you do not clear your doubts and move further, you will hardly understand later topics. So it is better that you post your questions right below the article and I will try to reply as soon as possible.


Throughout the series, if you have any suggestions to make, feel free to comment below this article or use this form to send your feedback.


James wiku August 25, 2019 at 7:21 pm

Interested if help usong all advanved apps in kali lenux on android. Via userland.

Gilad November 24, 2019 at 2:17 am

Well, why is Kali good for system penetrations? What tools or resources does a hacker wish for, that Kali supplies?

bjorn de corte January 15, 2020 at 11:40 pm

i really would like to follow this,

TJ January 24, 2020 at 8:29 am

When is the series pickinig up again?

Sohail January 24, 2020 at 5:12 pm

Hi TJ, Thanks for your interest in the series. It’ll be resumed next month.

Howard January 25, 2020 at 6:25 am

I was hacked, please tell me how to remove him from my computer. PLEASE , PLEASE.

Sohail August 20, 2020 at 2:10 pm

The above comments wrong timestamp is due to a bug in the previous theme. Please ignore the timestamps.

Collin September 18, 2020 at 3:44 pm

I really would like to follow this

Vishal December 4, 2020 at 4:12 pm

Me and my few friends is very excited about your upcoming posts, we want to learn abouts tools out there for penetration testing. Also provide some tips and tricks for a normal user how he/she can use this tools for various other things apart from penetration testing.

Mohd Sohail December 4, 2020 at 11:59 pm

Thanks for following. I will definitely try to cover as much practical knowledge as I can. 🙂 Kindly share the articles on your social media pages.

Divaniti February 4, 2021 at 12:19 am

i’m interested in penetration testing as a career and i would much appreciate if you post more about it or help me to find some articles
Thank you a lot


Leave a Comment

* By using this form you agree with the storage and handling of your data by this website.