Ethical Hacking with Kali Linux – Part 1: Objective

March 29, 2016 | Views: 32791

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here

Ethical Hacking with Kali Linux – Part 1: Objective

>> Welcome all, to this series of Kali Linux for Ethical Hacking. This is first part and we’ll be seeing some of the intentions of this series.

Kali Linux is a special OS for Hacking and Penetration Testing Tools (for “White Hat” use).

# It’s used for:

– Improving system security
– Use in authorized environment only
– For those who understand networking fundamentals


# What you should expect from this series

– Getting familiar with more than 100+ tools used for Ethical Hacking
– Building an isolated Test Networks (Physical/Virtual)
– Practicing in a “Sandbox” test network
– Running Terminal Commands via Kali Linux, which is used for penetration testing


# Initial recommendation

– You must have a virtual environment ready with Kali Linux installed. (Confused? Watch some  YouTube videos – including my my tutorial: (Skip to ”Ethical Hacking in Nepali” Playlist, Part 4

. . . Assuming that you have gone through above process. . .

> > Updating Kali Linux Packages:

# Help and Documentation

man <command>
<command> -h
<command> -help
<command> –help


# Getting Current Advanced Package for Kali Linux (apt-get):

Go to terminal of Kali Linux and run:

man apt-get (gives detail about apt-get)

apt-get -h (for help option of apt-get)

Now, we’ll use the ‘update’ command (…assuming you have connectivity to internet…)


apt-get update

Done ?


apt-get upgrade


. . . Depending on your net speed, it will upgrade all packages it retrieved. . .


A quick note: This series is only for educational purpose. Practice this series in a lab, in a virtual/separate network and always avoid illegal activities. If you can, then support us to fight the bad guys.

See the other posts in this series:

Ethical Hacking with Kali Linux – Part 2: Finding Hidden SSIDS
Ethical Hacking with Kali Linux – Part 3: Bypassing Mac Address Filter
Ethical Hacking with Kali Linux – Part 4: Breaking WPA2 Wireless
Ethical Hacking with Kali Linux – Part 5: Rogue Wireless Access Points
Ethical Hacking with Kali Linux – Part 6: Nmap (Network Mapper)

By: Bijay Acharya (

Share with Friends
Use Cybytes and
Tip the Author!
Share with Friends
Ready to share your knowledge and expertise?
  1. Great article, thanks for share.

  2. Great Article !!!!

  3. Firstly thanks for this tutorial , i am facing a problem in my kali which i installed few days ago in my laptop. i am trying to connecting with wifi in it but it does not show any wlan networks and when i run command ifconfig in it , there is only ethernet network appears , no wlan0.please help me in this.

  4. Nice one.

  5. you guys are the best creating an environment for people to learn keep up the good work

Page 1 of 212»
Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge


We recommend always using caution when following any link

Are you sure you want to continue?