Linux Essentials for Hackers

https://www.youtube.com/watch?time_continue=3&v=A7HRLjVvoYYThe most common operating system used in penetration testing is Linux. In this course, we will cover how to install Kali Linux, a popular penetration testing Linux distribution, as well as common commands, file system navigation, networking, services, and Bash scripting. At the end of this course, you will have a basic understanding of Debian based Linux and will be prepared to move forward in your studies.

INTRODUCTION

INSTALLING VMWARE

In this video, we will demonstrate how to install VMware on your machine in preparation for the install of Kali Linux.

INSTALLING KALI LINUX

In this video, we will cover how to install Kali Linux on your VMWare software

NAVIGATING THE FILE SYSTEM

In this video, we will cover basic Linux commands that help us navigate the file system, to include the man, pwd, ls, cd, mkdir, rmdir, cp, mv, and locate commands.

USERS AND PRIVILEGES

In this video, we will cover common user and privilege commands in Kali Linux, to include the adduser, su, sudo, and chmod commands.

NETWORK COMMANDS

In this video, we will cover the common networking commands you should know before learning penetration testing, to include ifconfig, iwconfig, ping, arp, route, and netstat commands.

VIEWING, CREATING, AND EDITING FILES

In this video, we will discuss the many ways to view, create, and edit files in Linux to include the use of echo, cat, touch, nano, and gedit.

CONTROLLING KALI SERVICES

In this video, we will cover how to start and stop services on your Kali machine using the service and systemctl commands.

NARROWING DOWN RESULTS

In this video, we will cover how to narrow down output using tools such as grep, cut, and sed.

SCRIPTING WITH BASH

​In this video, we will cover how to build a ping sweeper using Bash with condition statements and loops as well as terminal one liners.

CONCLUSION

It was a pleasure learning with you!