How to create a WiFI jammer: 3 ways

how to create wifi-jammer using Linux 3 ways 2017 guide

Here is Kali Linux training for beginners>wifi jammer Do you enjoy high-speed INTERNET but unable because there are lot devices connected to that wifi network. OR you want to create wifi jammer so nobody can use The INTERNET. Here is everything which you should know about WiFi jammer. I am not talking about a hardware component which creates wifi jammer. …

Read more

How to install Kali Linux step by step [all ways]

installing kali linux

You are here Kali Linux training>Chapter 2 Welcome to the second chapter In this we  will discuss installing Kali Linux If you don’t know what is Kali Linux?  It is operating system used by hackers because it has all software that needed in Hacking. It is free and open source [open source mean you can modify it and sell it without …

Read more

How to Hide your IP for browsing anonymously

how to hide Ip adress

You are here Kali Linux training>Chapter 4 In this lesson, we well talk about how can you hide your identity/browse anonymously or Change Ip address There are several ways to hide or change your Ip address in Kali Linux Using proxychain Using Vpn Make sure you visit hacking for beginners to know how proxy and VPN are working. Must read: …

Read more

Basic Kali Linux commands for Hacking

linux

You are here Kali Linux training>Chapter 3 Hope you have installed Kali Linux in virtual box or using any other way. In this lesson, I am talking about basic commands in Kali Linux, not all only that you needed in starting a + free source of learning all Linux commands. Before commands, I want to introduce you Terminal. The terminal is software …

Read more

Metasploit Tutorial for beginners: Master in 5 minutes

getting start with metasploit

You are here Kali Linux training>Chapter 6 In this post, we will talk about the Metasploit framework. I am sure you have enough heard about Metasploit and maybe still confuse what is this and how to use it? It is framework mean it is the collection of a number of  exploits. You can gather information, make malware, hack FTP, hack …

Read more