Cybersecurity Videos
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityVideosTop 10 Things To Do After Installing Kali Linux
Cybersecurity

Top 10 Things To Do After Installing Kali Linux

•December 29, 2025
0
Loi Liang Yang
Loi Liang Yang•Dec 29, 2025

Why It Matters

It demonstrates how quickly a new Kali user can move from installation to active network reconnaissance, highlighting both rapid skill development for ethical hacking and the potential security threats to unsecured public Wi‑Fi environments.

Key Takeaways

  • •Use Nmap to map network devices on public Wi‑Fi.
  • •Leverage Nmap scripts to enumerate SMB shares and open ports.
  • •GUI Zenmap simplifies scans with visual topology and quick presets.
  • •Brute‑force SMB credentials with Hydra using common username lists.
  • •Deploy Social‑Engineering Toolkit and ZAP proxy for credential harvesting.

Summary

The video walks viewers through the first ten practical steps after installing Kali Linux, emphasizing hands‑on reconnaissance rather than passive watching. It begins with Nmap, showing how to scan a local subnet (e.g., 192.168.0.0/24) on public Wi‑Fi, add fast‑scan flags, and identify live hosts and open services. The presenter then demonstrates using Nmap scripts to enumerate SMB shares on port 445, connecting to exposed folders with smbclient, and leveraging the Zenmap GUI for visual topology and quick‑scan presets. Key insights include chaining tools: after spotting a vulnerable service, Hydra is used to brute‑force SMB credentials with common username/password lists, successfully retrieving passwords like “12345678.” The tutorial also covers the Social‑Engineering Toolkit to spin up fake login pages for credential harvesting, and OWASP ZAP’s automated spider and active scans that flag issues such as missing CSRF tokens and reflected XSS. Throughout, the host stresses permission and ethical considerations while showcasing real‑world examples on a hotel Wi‑Fi network. Notable moments feature a live demonstration of scanning a router’s port 80, accessing a printer’s web interface, and capturing credentials from a crafted phishing page that logs the victim’s email and password. The presenter highlights the speed of Zenmap’s 12‑second comprehensive scan and the ease of copying payloads from ZAP’s findings for manual testing, illustrating a seamless workflow from discovery to exploitation. The implications are clear: even a novice can transition from a fresh Kali install to active network penetration within minutes, underscoring both the educational value for aspiring ethical hackers and the heightened risk posed to unsecured public networks when such tools are misused. Proper training, permission, and awareness become essential as these capabilities lower the barrier to entry for real‑world attacks.

Original Description

// Membership //
Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: https://www.youtube.com/channel/UC1szFCBUWXY3ESff8dJjjzw/join
// Courses //
Full Ethical Hacking Course: https://www.udemy.com/course/full-web-ethical-hacking-course/
Full Web Ethical Hacking Course: https://www.udemy.com/course/full-web-ethical-hacking-course/
Full Mobile Hacking Course: https://www.udemy.com/course/full-mobile-hacking-course/
Full AWS Security Course: https://www.udemy.com/course/aws-security-course/
// Books //
Kali Linux Hacking: https://amzn.to/3IUXaJv
Linux Basics for Hackers: https://amzn.to/3EzRPV6
The Ultimate Kali Linux Book: https://amzn.to/3m7cutD
// Social Links //
Facebook: https://www.facebook.com/Loiliangyang/
Instagram: https://www.instagram.com/loiliangyang/
LinkedIn: https://www.linkedin.com/in/loiliangyang/
// Disclaimer //
Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.
0

Comments

Want to join the conversation?

Loading comments...