Linux Essentials for Hackers
https://www.youtube.com/watch?time_continue=3&v=A7HRLjVvoYYThe most common operating system used in penetration testing is Linux. In this course, we will cover how to install Kali Linux, a popular penetration testing Linux distribution, as well as common commands, file system navigation, networking, services, and Bash scripting. At the end of this course, you will have a basic understanding of Debian based Linux and will be prepared to move forward in your studies.
In this video, we will demonstrate how to install VMware on your machine in preparation for the install of Kali Linux.
INSTALLING KALI LINUX
In this video, we will cover how to install Kali Linux on your VMWare software
NAVIGATING THE FILE SYSTEM
In this video, we will cover basic Linux commands that help us navigate the file system, to include the man, pwd, ls, cd, mkdir, rmdir, cp, mv, and locate commands.
USERS AND PRIVILEGES
In this video, we will cover common user and privilege commands in Kali Linux, to include the adduser, su, sudo, and chmod commands.
In this video, we will cover the common networking commands you should know before learning penetration testing, to include ifconfig, iwconfig, ping, arp, route, and netstat commands.
VIEWING, CREATING, AND EDITING FILES
In this video, we will discuss the many ways to view, create, and edit files in Linux to include the use of echo, cat, touch, nano, and gedit.
CONTROLLING KALI SERVICES
In this video, we will cover how to start and stop services on your Kali machine using the service and systemctl commands.
NARROWING DOWN RESULTS
In this video, we will cover how to narrow down output using tools such as grep, cut, and sed.
SCRIPTING WITH BASH
In this video, we will cover how to build a ping sweeper using Bash with condition statements and loops as well as terminal one liners.
It was a pleasure learning with you!