Kali Linux Introduction

Date: 2025-02-26

Difficulty: Beginner

Delivered By: TBC

Overview

Join us as we explore the tools Kali Linux provides - showing you how they can be used when penetration testing. Gone are the days of manually investigating everything. Plenty of tools exist to automate common processes and attacks, and, now that you have the base knowledge, it's time to show you some of the most useful!

We will explore:

     🕵️ Common attack paths

     🔨 Useful tooling

     🦺 How to use tooling safely

Knowledge from prior sessions is helpful, but not required.

Prerequisites

This sessions assumes that you are familiar with a Unix shell. If you are not but wish to take part, we highly recommend that you read the first three chapters of this crash course.

This session also requires Kali Linux. The easiest way to attempt it is to setup a Kali VM (described here). We can help with this during the session, but it saves time if you already have one set up and lets you get right into the challenges.

Challenges

Details on how to access the challenges will be available at the session.

If you finish, or just want to try something else, you can have a go at

If you do complete Bandit/Natas challenges, you can also submit each level's password on the flag tracker for some extra points on the leaderboard!