Kali Linux Ethical Hacking Course Curriculum & Commands
🔥 Kali Linux Ethical Hacking Course Curriculum & Commands
This curriculum is designed for ethical hackers, cybersecurity enthusiasts, and penetration testers using Kali Linux. It covers reconnaissance, exploitation, wireless attacks, password cracking, and post-exploitation techniques.
📌 Module 1: Introduction to Kali Linux
🔹 Installation & Setup
-
Install Kali Linux (VirtualBox, VMware, Dual Boot)
-
Basic Linux commands (
ls,cd,cp,mv,rm,nano) -
File permissions & ownership (
chmod,chown) -
Package management (
apt update && apt upgrade) -
Network basics (
ifconfig,ip a,netstat)
🔹 Useful Commands:
🕵️♂️ Module 2: Information Gathering & OSINT
🔹 Passive & Active Reconnaissance
-
WHOIS Lookup (
whois example.com) -
DNS Enumeration (
dig example.com,nslookup example.com) -
Subdomain Discovery (
sublist3r -d example.com) -
Google Dorking (
site:example.com filetype:pdf)
🔹 Scanning & Enumeration (Nmap, Netcat, Recon-ng)
🌐 Module 3: Web Application Hacking
🔹 Web Vulnerability Scanning
-
nikto -h http://example.com→ Scan for web vulnerabilities -
gobuster dir -u http://example.com -w /usr/share/wordlists/dirb/common.txt→ Find hidden directories -
sqlmap -u "http://example.com/page.php?id=1" --dbs→ Test for SQL Injection -
xsstrike -u "http://example.com/search?q=test"→ Find XSS vulnerabilities
🔹 Burp Suite for Web Attacks
-
Intercepting HTTP requests
-
Session hijacking & cookie manipulation
-
Modifying parameters for SQLi/XSS
🔓 Module 4: Password Cracking & Brute Force Attacks
🔹 Using Hashcat for Password Cracking
🔹 John the Ripper
🔹 Hydra (Brute Force Login)
📡 Module 5: Wireless Hacking
🔹 Monitor & Capture WiFi Networks
🔹 Crack WPA2 Password
🔹 Deauthenticate a WiFi Client
💀 Module 6: Exploitation & Metasploit Framework
🔹 Start Metasploit
🔹 Create Payload
📶 Module 7: MITM Attacks & Sniffing
🔹 ARP Spoofing (Bettercap)
🔹 Packet Sniffing
🛡️ Module 8: Anonymity & Privacy
🔹 Tor & Proxychains
🔹 Change MAC Address
🎯 Bonus: Bug Bounty & Penetration Testing
-
Reporting vulnerabilities
-
Bypassing firewalls & WAFs
-
Automating attacks with Python
Comments
Post a Comment