Ethical Hacking with Kali Linux – Part 1: Objective

March 29, 2016 | Views: 30997

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here

Ethical Hacking with Kali Linux – Part 1: Objective

>> Welcome all, to this series of Kali Linux for Ethical Hacking. This is first part and we’ll be seeing some of the intentions of this series.

Kali Linux is a special OS for Hacking and Penetration Testing Tools (for “White Hat” use).

# It’s used for:

– Improving system security
– Use in authorized environment only
– For those who understand networking fundamentals


# What you should expect from this series

– Getting familiar with more than 100+ tools used for Ethical Hacking
– Building an isolated Test Networks (Physical/Virtual)
– Practicing in a “Sandbox” test network
– Running Terminal Commands via Kali Linux, which is used for penetration testing


# Initial recommendation

– You must have a virtual environment ready with Kali Linux installed. (Confused? Watch some  YouTube videos – including my my tutorial: (Skip to ”Ethical Hacking in Nepali” Playlist, Part 4

. . . Assuming that you have gone through above process. . .

> > Updating Kali Linux Packages:

# Help and Documentation

man <command>
<command> -h
<command> -help
<command> –help


# Getting Current Advanced Package for Kali Linux (apt-get):

Go to terminal of Kali Linux and run:

man apt-get (gives detail about apt-get)

apt-get -h (for help option of apt-get)

Now, we’ll use the ‘update’ command (…assuming you have connectivity to internet…)


apt-get update

Done ?


apt-get upgrade


. . . Depending on your net speed, it will upgrade all packages it retrieved. . .


A quick note: This series is only for educational purpose. Practice this series in a lab, in a virtual/separate network and always avoid illegal activities. If you can, then support us to fight the bad guys.

See the other posts in this series:

Ethical Hacking with Kali Linux – Part 2: Finding Hidden SSIDS
Ethical Hacking with Kali Linux – Part 3: Bypassing Mac Address Filter
Ethical Hacking with Kali Linux – Part 4: Breaking WPA2 Wireless
Ethical Hacking with Kali Linux – Part 5: Rogue Wireless Access Points
Ethical Hacking with Kali Linux – Part 6: Nmap (Network Mapper)

By: Bijay Acharya (

Share with Friends
Use Cybytes and
Tip the Author!
Share with Friends
Ready to share your knowledge and expertise?
  1. Great Work, Thanks alot

  2. Great, thank a lot!!! 🙂

  3. The challenge with running Kali Linux inside a virtual machine is that the PHYSICAL wifi adapter will only show up as a VIRTUAL ethernet adapter. The recommended way to get around this problem is to buy a USB wifi adapter which can be configured in Kali, assuming you buy a model that is supported.

    This link below actually shows an alternate way around this problem using Docker virtualization, but this assumes that your base operating system is a type of Linux, not Windows.

Page 2 of 2«12
Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play

Support Cybrary

Donate Here to Get This Month's Donor Badge

Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?