KALI LINUX
SETTING UP FOR THE HACK
Now that we
have begun the journey of learning what hacking is and what all the phase of
hacking are, it’s time to get down and get our hands dirty. We will need to set
up for the hack.
First off,
we need a system to start hacking. Of course. Unless the only hacking you want
to do is the snacks corner. We also need to set up a virtual system and install
all the tools required to start the hack. The following video will get you
started.
KALI AND VIRTUAL BOX SETUP
This video
takes you through the steps to set up a virtual box. A virtual box essentially
allows us to install another operating system consecutively with your already
installed operating system.
You will
also get to know how to install Kali LINUX operating system, one of the most
widely used operating systems amongst hackers.
Finally,
the video also shows you how to successfully open the kali machine using the
virtual box 3.0.
Because one
can never have enough operating systems.
WHAT IS “VPN TUNNELING”?
VPN stands
for virtual private network. It is an encrypted tunnel between two devices that
lets you access every websites and online service privately and securely.
VPN
tunneling creates a point-to-point connection between two devices, often the
VPN server and your device. Tunneling encapsulates your data into standard
TCP/IP packets and safely transfers it across the internet. Because the data is
encrypted, hackers, governments, and even internet service providers cannot see
or gain control of your information while you are connected to a VPN server.
Let’s take
into consideration a VPN service like Express VPN. The working can be
illustrated as follows.
WHY DO WE NEED “VPN”?
From
enhanced security to saving money, there are many benefits that comes from
using a VPN.
Let’s look
at why we need VPN
1. Staying private: Your internet
services provider can see your internet traffic and probably logs your browsing
history. A VPN scrambles your traffic in an encrypted tunnel so not even your
ISP can read it. No monitoring, no activity logs.
2. Defeat censorship: The websites or
services you want to use may be inaccessible from your location. Your VPN
enables access to the free internet from anywhere.
3. Save money: Some online stores show
you higher prices if you’re browsing from certain locations. VPN lets you safe
from price discrimination.
4. Encrypt everything: Free public
Wi-Fi is dangerous. It’s trivially easy for a hacker on the same network to
read your personal data.
A VPN encrypts your entire internet connections, even over unsecured
networks.
WHO USES TOR?
This day in
age, everyone is tracking you online whether it’s for surveillance, analytical
reason, or marketing purposes. The general Tor user uses Tor to avoid being
tracked and to keep a sense of privacy. Aside from those who are generally
conscious of their online privacy while they browse the Internet, Tor has many
uses for different people.
·
Journalists
use Tor to ensure their privacy and safety.
·
Bloggers
are often used for saying perfectly legal things online and Tor helps them
remain anonymous.
·
IT
professional use Tor to perform tests on their own security systems and obtain
access to the Internet while leaving security policies intact.
·
Law
enforcement uses Tor to remain anonymous when conducting online surveillance
and undercover operations.
·
Militaries
use Tor to remain hidden from insurgents who monitor Internet traffic and
gather intelligence.
·
Activists
and whistleblowers use Tor to remain anonymous.
1. Which operating system do we use for
our Ethical Hacking course?
a. Ubuntu
b. Mac OS
c. Windows
d. Kali Linux
Ans- Kali Linux
KEY TAKEAWAYS!
Let’s now
revise some of the Key points from the tutorial
·
We
have to download the Virtual box in order to run the other operating system in
our laptop.
·
We
also have to download the Kali Linux Operating system to begin our journey of
hacking.
·
Follow
all instruction carefully while installing the Virtual Box or else it will
corrupt the system.
·
The
username and password for the Kali Linux system is “root” and “toor”
respectively.
0 Comments