Like the introduction video, this statement packs a real punch. This was done to inspire you, get excited about your training and kickstart your path. You’re now in the fight if it was successful. We want you to be able to access the many resources that we have made available for you in order to master Kali Linux and penetration testing.
Most likely, you’re familiar with Kali Linux Revealed: Mastering the Penetration Testing Distribution, available at OffSec Press. This is not a sales pitch. Because we love you, we made this book free to download in both HTML and PDF formats. There’s even more. We also offer chapter exercises online at kali_ after a free registration so that you can check your knowledge and gain some practical experience while you read the book. Our first Kali Linux Certified Professional (KLCP) certification has been created. This will allow you to take your Kali Linux training to the next level. This is the area where many people get confused or overwhelmed. Let’s discuss what it all is.
Kali Linux Revealed: What’s That?
Let’s start with Kali Linux Revealed. You can buy Kali Linux Revealed (fairly priced) from Amazon or other retailers.
Download the PDF for free, or read the instructions below.
You’ll get exactly the same content. It doesn’t matter what the difference is. Why are we giving away books and selling them? We are not selling books to make money. The book was written to be an official guide for Kali Linux and to increase the knowledge base for Kali.
You can also learn more about by following the exercises at .training . These will help you to build your skills and gain practical experience. This will prepare you to take the KLCP.
What is the KLCP exactly? After you have completed the KLCP, and not just read the book or skimmed it, the exercise books will be available for you to review. The KLCP, which is a multiple-choice exam consisting of 80 questions and takes 90 minutes (proctored ). It’s the basisal Kali Linux certification.
What is Inside?
This is all about the Kali Linux Revealed content, both online and in print. Let’s get into the details.
We’ve been accused of being too simple for some users and too complex for others. We provide an introduction to Kali Linux, then go into detail about all features and finally dive into more advanced topics. It covers a wide range of topics.
In the beginning, we will discuss Kali Linux basics. The first chapter will discuss Kali Linux’s history, the relationship to Debian, Kali policies, use cases and features. It also discusses what Kali Linux can be used for. Chapter two will provide details about how to install Kali Linux and create a bootable Kali USB. It also explains how to setup a virtual machine. We will be discussing Linux basics, terminology, basic commands and a bit about troubleshooting and system logging in chapter 3.
After you have registered on Kali.training you will be able to start the end-of-chapter exercise. These exercises will help you:
- Create a brand new VM
- Boot Kali Live
- Check the kernel boot options
- Verify Kali by downloading it
- Kali can be installed on USB or VM
- Modify the kernel boot parameters
- Practice Linux job control
- You can search and modify files
- Perform hardware configurations enumeration and manipulation
The table of contents’ turning point is reached when beginners get excited and more advanced users dismiss it as useless beginner material. Many people are happy to just bounce around the book and use it as a guide, but if you want to improve your knowledge or get your KLCP certified, then you need to read every chapter. The book has a wealth of useful material that can be used by all levels.
Continue the Journey
We continue our journey by entering chapter 4. Here we will cover the installation requirements and show you how Kali can be installed as an unattended, standard, ARM, or encrypted install with LVM/LUKS.
You’re not missing the benefits of the unattended install and security provided by LUKS “nuke” encryption. Kali.training will provide hands-on training with a completely encrypted, unattended and customized ARM installation on a Raspberry Pi. This chapter’s final section will have you building your “Kali Pi”, as well mounting the file system and chrooting it to make any post-installation modifications. You have extreme flexibility and it takes you away from the standard burnt-image path. This is particularly eye-opening to new users.
We will be discussing service configuration management and user configuration in Chapter 5. Then, chapter 6 will provide tips and tricks for troubleshooting Kali Linux, self-diagnosing, and getting support with any aspect. We’ll be diving into security topics as we move into chapter 7. This will include log and firewall configuration, monitoring, package auditing, and other host-based intrusion detection software. Although this might seem to be basic Linux system administration, Kali is a powerful secure OS. Each of these skills are essential for developing a solid foundational understanding of Kali.
These chapters will be covered and you’ll complete the exercises.
- Create new accounts
- Without Network Manager, configure network
- As WAP, spin up Hostapd
- Install Apache and PostgreSQL
- Masscan can be installed with a customized web interface
- Hostapd allows you to create a custom point of access for PI.
- Test and create firewall rules
- How to prevent brute force passwords
- Modify and install an IDS system on a host
Another turning point in the book is this. This is yet another turning point in the book. We have covered Kali installation and usage, taken on administrative roles and brought even the most novice user to an acceptable foundational knowledge. Advanced users might be confused and wondering when their time will come. It is now. These are Kali Linux Revealed’s meat chapters. These chapters are the longest, most detailed and densely packed in the book. Each chapter has a lot of interesting stuff for even the most advanced users.
Chapter 8 is all about Debian Package Management. Debian, a mature and robust operating system, allowed Kali to reach the top of its distribution. Debian gave us so many new features, that this chapter outlines the basis of how these features are possible.
You’ll have used apt-update to do anything you can with Kali. You can skip this step, just follow the instructions, and then move on. Debian’s packages management tools are powerful and flexible, but what goes on behind-the scenes is amazing. This is how we get to the heart of it all. Do you know the differences between apt, dpkg and apt? How about aptitude? We will explore each utility’s powerful capabilities and then we will dive into the details to reveal some of their most powerful features.
You can jump into the exercises at the end of Chapter 8.
- Use cutting-edge software like the Social Engineering Toolkit, (SET).
- You can create custom packages that include an offline Nessus installation. This includes all the plugins
- Configure and install packages for foreign architectures
- Kali Linux allows you to install Windows-based applications
Chapter nine will teach you how to modify Kali packages and recompile Kali kernel. You can create custom packages that allow you to share, distribute, deploy, or rollback your changes.
You will learn:
- Create custom Kali ISO images from Kali, such as an upgraded version of Angela’s live USB. Robot
- Create a unencrypted Kali USB
- Create an encrypted Kali USB using LUKS. This allows you to erase your data by entering a password.
- Make your metapackage with exactly the tools that you need to deploy.
We’ll be moving on to Chapter ten. In this chapter, you will learn how to install Kali Linux across the network. There are also options to do an unattended, complete installation. You’ll learn how to set up a fully-featured Enterprise Kali installation that lets you deploy Kali “minions”, which you can manage from one central master. We will also show you how you can create your very own custom package repository. You will learn how to build custom Kali packages with your configuration options and package builds by combining the knowledge from these last chapters. After booting, you will be able to create custom Kali instances that can do whatever you wish. It will be possible to install Kali on a network with unattended options. You can also set up custom package repositories that allow for quick deployment.
This is the peak of Kali Linux’s power and the point where you truly master the penetration testing distribution.
Kali Linux Revealed. The resources at as well as the KLCP are so extensive that it is hard to summarise. But we hope you will take the next step on your journey, and join us at Kali.training.