Hacking 1
Date: 2026-04-02
Difficulty: Intermediate
Delivered By: Percy Baker
Overview
Hacking 1 is the first of a 3-part ethical hacking series where we'll teach you how to scan a network for targets and gain access to those targets. The aim is to walk you through roughly what a real-life penetration test might look like.
This week we will be covering the basics of networks - showing you how to map networks and bypassing certain defensive methods using a kali VM
This week's session will be split into two parts:
-
setting up a kali VM; we will walkthrough setting up the tools needed for the next three weeks of sessions, would be helpful to install the .iso beforehand to not overload the uni's network
-
mapping out a network using various kali techniques including nmap and IP/MAC address spoofing and other methods bundled with kali linux
Useful Resources
- Our docs page for creating a Kali VM
- Guide for creating Kali VM
- A different guide for creating Kali VM
- Kali website
Session Link
The session link will be posted at the start of the session
