Hacking For Babies
  • Introduction
  • Ethical Hacking
  • Kali Linux
    • Why Kali ?
    • Virtual Machine
    • kali on Cloud
    • Bootable USB
    • Dual Boot Kali
    • Kali Nethunter
    • Most Used Linux Commands
    • Additional Information
  • Network Basics
    • What is the internet ?
    • Key Words
    • Network devices
    • LAN / WAN
    • VPN (Virtual Private Network)
    • Deep and Dark Web
    • Networking Commands
    • Additional Information
  • OSINT
    • Maltego
    • Google Advanced Search Operators
    • OSINT Username Finder
    • Social Media OSINT
    • Reverse Image Search
    • Protect yourself from OSINT
    • Additional Information
  • Digital Forensics
  • Phishing Attacks
    • Temporary Numbers
    • GitHub Projects/Tools
    • Kali Pre-Installed Tools
    • Emails Tricks
    • How to secure yourself from phishing attacks
    • Additional Information
  • Hardware Attacks
    • Marketplaces and Websites
    • Keylogger
    • USB Killer
    • Ethernet Hacking Tools
    • Flipper Zero
    • Bad USB
  • HID Attacks
    • Classic Bad USB
    • Wireless Bad USB
    • Keystroke Injection Cable
    • Other Tools Using the Some Concept
    • Simple Ducky Script
    • Reverse Shell Ducky Script
    • Solution for Bad USB
  • Cryptography
    • What is Cryptography ?
    • Simple Cryptography Algorithms
    • Hash Algorithms
    • Symmetric / Asymmetric cryptography
    • RSA Cryptosystem
    • Quantum Computers VS Cryptography
    • Steganography: Hiding Data in music and photos
    • Additional Information
  • Password Attacks
    • Dictionary Attacks
    • Brute Force Attacks
    • Hashcat
    • Hydra
    • Other Password Attacks Tools
    • Protect your Self against Password Attacks
  • Wireless Attacks
    • RFID / NFC Attacks
    • Bluetooth Attacks
    • MouseJack Attacks
    • IR Replay Attacks
    • RF Attacks
    • Wifi Attacks
  • WIFI Attacks
    • Wireless Adapters
    • Basic WIFI Manipulation
    • Deauthentication Attack
    • WIFI Cracking
    • MITM Attacks
    • Prebuild WIFI Pentesting Tools
    • WIFI Attack Solution
    • Additional Information
  • WIFI Cracking
    • WEP Cracking
    • WPS Attack
    • WPA Handshake Capture
    • PMKID Hash Capture
    • Hashcat Cracking
    • Wifite
    • Airgeddon
    • Fern WIFI Cracker
    • Protecting your Wi-Fi network from cracking
  • Coming Soon
Powered by GitBook
On this page
  • Other way to run Kali
  • Using Container
  • Using WSL
  • Test Your Linux Commands Knowledge
  • Command Explain
  • The History of OS
  • All Linux Distributions
  • Valuable Books
  • Linux Basics for Hackers
  • Other Linux Courses
  • Windows Command Lines (CMD Commands)
  1. Kali Linux

Additional Information

PreviousMost Used Linux CommandsNextNetwork Basics

Last updated 1 year ago

Other way to run Kali

Using Container

Using Container technology such as and /, our Kali containers allow you access to the Kali toolset on your host operating system without the overhead of running an additional full operating system. This does come with limitations, as you won’t have direct hardware access and dealing with inbound connections to tools running in the Kali container can be complicated.

Using WSL

Windows Subsystem for Linux (WSL) is a software package on modern Windows installs that allow you to run Linux alongside your Windows system in an optimized container. The Kali WSL package allows easy access to the Kali toolset. This comes with the same drawbacks of a standard VM, but allows for less overhead and tighter integration with your Windows systems.

Test Your Linux Commands Knowledge

Command Explain

if you find a command and you don't know what it do you can use explainshell.com to understand what it do

The History of OS

All Linux Distributions

Valuable Books

Linux Basics for Hackers

Linux Basics for Hackers is a book that teaches the fundamentals of the Linux operating system, with a focus on how hackers would use it. It covers topics such as the Linux command line, filesystems, networking, scripting, and security.

Other Linux Courses

You can watch the following YouTube playlists if you wish to learn more about Linux:

Windows Command Lines (CMD Commands)

You can watch the following YouTube Videos if you wish to learn about Windows Commands:

You can watch created by to run kali on Docker Containers.

You can watch created by to test your knowledge about Linux Commands.

You can watch created by to learn more about the history of OS and Computers (This Arabic-language YouTube playlist).

You can watch created by to learn more about the history of Computers (This Arabic-language YouTube Video).

created by

created by

created by

created by (with )

created by (This Arabic-language YouTube playlist)

created by

created by

this YouTube Video
NetworkChuck
this YouTube Video
NetworkChuck
this YouTube Playlist
anaHr
this YouTube Video
New Media Academy Life / Da7i7
This YouTube Playlist
NetworkChuck
This YouTube Video
freeCodeCamp.org
This YouTube Playlist
David Bombal
This YouTube Video
David Bombal
Occupy The Web
This YouTube Playlist
Saif Alwedyan
This YouTube Video
NetworkChuck
This YouTube Video
NetworkChuck
Docker
LXC
LXD
LogoGet Kali | Kali LinuxKali Linux
LogoGet Kali | Kali LinuxKali Linux
Logoexplainshell.com - match command-line arguments to their help text
LogoList of Linux distributionsWikipedia
LogoLinux Basics for Hackers: Getting Started with Networking, Scripting, and Security in KaliAmazon.com