Demonstrations of the most popular hack-tools of LINUX

Learn how to use various security tools of Linux
3.6 (18 ratings)
Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
1,436 students enrolled
$19
$35
46% off
Take This Course
  • Lectures 40
  • Length 4 hours
  • Skill Level All Levels
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 8/2015 English

Course Description

  • Most students who wish to learn hacking, probably haven't used Linux before. Some students know only the theory, but they do not know how it's actually done. Right now, you may be a newbie, you may not know what a teminal is. If this is the case, then this course is perfect for you. Its best suited for students who enjoy learning by doing things in a practical way. The following security tools are featured in this course:
  • Wireshark
  • Nmap
  • Hydra & Hydra-gtk
  • macchanger
  • tor browser
  • Aircrack-ng
  • Reaver
  • Fern wi-fi cracker
I have tried to keep this course short and to-the-point. So almost all the lectures are video demonstrations of various techniques. The first four sections deal with the basics of the Linux operating system. In section 5, you will learn how to install the security tools of kali linux on ubuntu. From section 6 to section 10, you will learn how to use the above mentioned tools in Linux. Throughout the course, you will find out about more and more commands and techniques, and you will realise how flexible Linux is. After completing this course, you will have the skills of a hacker.

What are the requirements?

  • A Desktop/Laptop, and a phone(only for one demonstration) is definitely required.
  • A version of linux(preferably Ubuntu) is needed. Installation guidelines are provided in this course. But if you want, you can install it before beginning with this course(try to install a LTS version).

What am I going to get from this course?

  • Understand how the Linux system works.
  • Learn how to install the security tools of Kali-Linux on Ubuntu.
  • Learn the networking skills required for every hacker.
  • Learn how to use security tools like nmap, wireshark, hydra, fern etc.

What is the target audience?

  • This course is meant for beginners who are interested to learn hacking but are not so familiar with the Linux operating system.
  • IT professionals who want to learn how to use the featured security tools of Linux.
  • This course is strictly a practical course. So, if you are looking for theoretical knowledge, this course probably isn't for you.

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: Introducing LINUX
Getting started
Preview
03:15
Section 2: Installing Ubuntu
Installing Ubuntu
1 page
Section 3: Terminal commands
What is a terminal?
5 pages
01:33

How to open a terminal

10:05

Learn the basic terminal commands that you'll need everyday!

List of terminal commands
1 page
Section 4: A few important things
About root shell
8 pages
Important directories
6 pages
Repositories in UBUNTU
6 pages
About Synaptic Package Manager
6 pages
Section 5: Gathering the tools
10:23

Learn how to install the security tools of kali linux on Ubuntu.

17 pages

List of important kali-linux hack tools.

files
1 page
Section 6: Basic networking skills
What are ports?
9 pages
07:21

Learn how to create a virtual wi-fi hotspot manually on Ubuntu

09:05

Learn how to hide your Mac address

06:22

Learn how to change your IP address

06:37

Learn how to stay anonymous on the internet.

Section 7: Network monitoring
About Wireshark
6 pages
06:23

Learn how to install wireshark using a terminal

03:46

Learn how to capture data packets with wireshark

09:44

Learn how to get sensitive information like login credentials on a wi-fi network

Section 8: Network scanning
Introduction to nmap
5 pages
02:34

Learn how to install the nmap tool.

Various scanning techniques
08:44
Version detection
03:06
OS detection
03:31
Second generation advanced detection system
03:29
Advanced scans
09:37
Section 9: Brute force attack
About hydra
6 pages
05:33

Installing hydra and hydra-gtk using a terminal

10:18

A demo of how email accounts are hacked with bruteforce tools like hydra

Section 10: Cracking WI-FI router passwords
About aircrack, reaver and fern wi-fi cracker
8 pages
Installing reaver
05:24
Installing aircrack
06:58
Hacking WPA/WPA2 passwords
07:46
Fern wi-fi cracker
06:04
Section 11: Reference manual
Reference manual
1 page
Section 12: Conclusion
What now?
01:29
Section 13: Extras
Mastering Kali-Linux ebook
Article

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Sourav Das, Software developer

Currently, I am a grad student studying computer science. By profession, I am a software developer. I have been working with various security tools for the last few years, and developed quite a few tools for the cyber-security community. Some of these tools include network scanners and bruteforcing tools.

I made this course to help people learn how the hacking is actually done in the field and I hope that you find this course useful!

Ready to start learning?
Take This Course