Kali Linux Introduction

Date: 2024-02-14

Difficulty: Beginner

Delivered By: Matthew Grove and Jacob Racklyeft

Kali Linux Introduction

Join us as we explore the tools Kali Linux provides - showing you how they can be used when penetration testing. Gone are the days of manually investigating everything. Plenty of tools exist to automate common processes and attacks, and, now that you have the base knowledge, it's time to show you some of the most useful!

We will explore:

     🕵️ Common attack paths

     🔨 Useful tooling

     🦺 How to use tooling safely

Knowledge from prior sessions is helpful, but not required.

Prerequisites

This sessions assumes that you are familiar with a Unix shell. If you are not but wish to take part, we highly recommend that you read the first three chapters of this crash course.

This session also requires Kali Linux. The easiest way to attempt it is to setup a Kali VM (described here).

Challenges

Attempt the Hack the Box Labs or Natats or Bandit