Kali Linux & Metasploit: Getting Started with Pentesting by Nicholas Handy

Feb 1, 2019

Learning Goals

  • Understand why and how Kali Linux is used
  • Learn the common commands and features of the Metasploit Framework
  • Build a testing environment with Kali Linux and Metasploitable 2
  • Complete an example attack with Metasploit


Reminder: Attacking systems you do not have permission to attack is illegal. Only perform attacks on machines and networks you own or have permission for.

Introduction to Kali Linux

The field of cybersecurity has an abundance of tools for all sorts of tasks. One way to cut right to the most common tools is using Kali Linux. Kali Linux is a Linux based operating system with preinstalled security tools for penetration testing. Kali Linux is created an maintained by Offensive Security who focus on advancing security through tools and education. For our purposes we will use a virtual machine so that we can have multiple machines running at the same time.

Notify of

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Inline Feedbacks
View all comments
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023