Cyber With KT
search
⌘Ctrlk
Cyber With KT
  • user-helmet-safetyAbout Me
  • 🗃️Courses
    • TCM
    • Cybrary
      • Offensive Penetration Testing
        • M01 : Setting the Foundation for Success
        • M02: Kali Linux Basics
          • Setting up the Kali Linux VM
          • Overview of Tools in Kali Linux
          • Understanding the Command Line
          • The who, what, when, where, and how of the Linux command line
          • Windows Commands
        • M03: Understanding Network Protocols
        • Important Things
    • HackingLK
    • Hackviser
    • CWL
  • 📚Concepts
  • 🏁Challenges/CTFs
  • 🚩Walkthrough/Writeups
  • 🛠️Tools & Commands
  • 💎Projects
  • 📱Content Creation
  • 📝Cheat Sheets
  • 🔍OSINT Tools & Notes
  • 🐞Bug Bounty
  • 💡Research & Experiments
  • Templates & Reporting
  • Interview & Certification Prep
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. 🗃️Courseschevron-right
  2. Cybrarychevron-right
  3. Offensive Penetration Testing

M02: Kali Linux Basics

Setting up the Kali Linux VMchevron-rightOverview of Tools in Kali Linuxchevron-rightUnderstanding the Command Linechevron-rightThe who, what, when, where, and how of the Linux command linechevron-rightWindows Commandschevron-right
PreviousFinding Resources to Prepare for the Offensive Penetration Testingchevron-leftNextSetting up the Kali Linux VMchevron-right