Skip to main content

Top 5 websites to Master Hacking with Kali Linux.

Despite writing so many tutorials on hacking with Kali Linux, I often get stuck and have to consult other resources. My blog has a lot of things but since I myself don't know everything, there's no way I can provide all the resources that you guys need. Here's a list of top 5 websites about hacking with Kali Linux that have enough resources to answer 99.9% of your queries, and have enough tutorials to teach you most of the stuff you need to know to get to a level where you can read the more complex stuff on any website.


5. Null Byte

Not dedicated to Kali, but to white hat hacking in general.
 
Advantages-
  • Lot of high quality content
  • Many content-creator / authors
  • Has a forum as well to ask questions
  • Active comments section
Disadvantages-
  • Not tailored to Kali
  • Navigation not very intuitive. Hard to find out stuff related to Kali.
 

4. Hacking-Tutorial

Very old website. Most websites in this list are fairly new, and probably didn't write tutorials for backtrack (Kali is what came after Backtrack 5 r3, instead of backtrack 6). However, this website was around before the time of Backtrack 5 R1 (when the the display manager was not started by default, and we had to use startx command just to get a GUI). 

 
Advantages-
  • Lot of high quality content
  • Mostly articles pertain to Kali Linux or Backtrack (the old posts). The backtrack ones will work with Kali without any changes in commands/procedure.
  • Only one author, so all posts are from one guy, means less low quality posts.
Disadvantages-
  • Design looks cluttered. Too many sharing widgets.
  • Only one author on this website, while it had it's advantage, there are disadvantages too. There's only so much good stuff one person can write.
 

3. Hacking Tutorials


Fairly new, pretty looking and frequently updated website.

 
Advantages-
  • The homepage is quite good and has posts organized by categories.
  • Content is high quality (I said this for every damn website I posted here, but then they made it to the list because of the high quality content).
  • Has many tutorials that you may not find on other websites (most sites have redundant tutorials, all the sites I've mentioned here will have a post about aircrack-ng, etc., but this site has some uncommon attacks and tools covered as well).
Disadvantages-
  • Not well organized content. You might end up reading something whose prerequisites you don't know and you can't understand what's going on in the tutorial.
  • Some very long posts doing stuff no one gives a rats ass about. Basically, lots of unnecessary content. I guess that comes as a side effect of having uncommon tutorials that won't be found on other websites. There's a reason why they aren't on most websites. It's because no is interested in reading them.

 

2. Black More Ops

Not limited to Kali Linux, has a lot of hacking tutorials.

 
Advantages-
  • While it's not limited to Kali, most of the content is focused on Kali
  • Again, lots of high quality content.
  • Navigation much easier
Disadvantages-
  • Some of the posts have nothing but a Youtube video, with no content to go along with it.
  • Some posts are news articles, instead of tutorials. Many people may not mind this, but some may.

 

1. Security Tube

This one has been around for ages too. However, it isn't providing any new free content anymore (but there's a lot of old content which is golden). The owner is now selling certified courses. (the creator is a badass, has written books, sells courses, discovered vulnerabilities and written attacks for WEP, etc.). 

 
Advantages-
  • Gold mine of resources if you're really interested in getting into hacking. No script kiddie stuff. The owner makes video tutorials and groups them up into megaprimers. Everything I know about wireless hacking I learnt from his wireless hacking megaprimer (the videos are free, the certification, if you want, will cost you).
  • I haven't stressed this enough, no script kiddie stuff. He actually has two assembly language megaprimers (again, free of cost).
Disadvantages-
  • Megaprimers are in very old operating systems, mostly backtrack 5.
  • Lets be honest, not everyone wants to watch 10 hours of video to learn the intricacies of hacking. Some are happy using tools and not caring about why or how they work. Unless you want to pursue a career in security, knowing how to use the tools would often be enough.
Despite the disadvantages, it's an awesome website. If you are really a security enthusiast, this is the go to site. All the other sites I've mentioned, as well as my blog, can't give you the in depth knowledge you can get from there. 

Comments

Popular posts from this blog

These are the precautions you have to take, When your E-MAIL has been Hacked.

It can be a real nightmare if someone hacks and takes control of your email account as it may contain confidential information like bank logins, credit card details and other sensitive data. If you are one such Internet user whose email account has been compromised, then this post will surely help you out by suggesting some of the steps that you need to take as soon as you realize that your  email account is hacked . Here is a list of steps and procedures that you need to follow in order to initiate the password recovery process: Steps to Recover Gmail Password: It can be a big disaster if your Gmail account has been compromised as it may be associated with several services like Blogger, Analytics, Adwords, Adsense, Orkut etc. Losing access to your Gmail account means losing access to all the services associated it with too. Here is a list of possible recovery actions that you can try: Step-1:  Try resetting your password! This is the fir...

Block or Redirect Unwanted Websites Using HOSTS File.

The  hosts file  is one of the interesting and useful feature of both Windows and Linux operating systems that provides many handy options in addressing network nodes. For instance, you can use the  hosts  file to block  annoying ads, pop-ups, banners, porn sites, or even redirect one website to another. In this post I will show you how to play around with the  hosts  file to accomplish some of the above mentioned jobs. What is a hosts File? The  hosts  file is just like any other computer file that is used by the operating system to map hostnames and domain names on to their corresponding IP addresses. In other words, when you type “google.com” on your browser’s address bar, your computer will look for the  hosts  file to see if it contains the corresponding IP address for the domain name you typed (google.com). In case if no entry is present in the  hosts  file, the request is then passed on to the DN...

What is DOS ? How to Hack with DOS Easily?

What is DOS ? How to Hack with DOS Easily? Guys,you may have seen Mr. Robot and remember the event when F-society use the DOS as a calling card to lure Elliot into helping them take down E-Corp or you may have been struck in situation when you try to open a Website  only to see a notification that Website is down. What is this? Yes, this is a DOS Attack. A denial of service (DoS) attack is an attack that clogs up so much memory on the target system that it can not serve it’s users, or it causes the target system to crash, reboot, or otherwise deny services to legitimate users.There are several different kinds of dos attack as discussed below:- 1) Ping Of Death  :- The ping of death attack sends oversized ICMP datagrams (encapsulated in IP packets) to the victim.The Ping command makes use of the ICMP echo request and echo reply messages and it’s commonly used to determine whether the remote host is alive. In a ping of death attack, however, ping causes the remote ...