Kali Linux Command Lines Part 1 – Intro and Getting Started

January 5, 2016 | Views: 9337

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here

Welcome, everyone, to this new series on using command lines in Kali Linux. My name is Bijay and I’ll be teaching the whole series of this training. This training series is recommended for beginners.

Let’s begin. Remember, Kali is a replacement of Backtrack. Just after releasing Bactrack 5 R3, the company stopped its release, and released Kali. Tools available in both platforms are the same. We can say the next generation of Backtrack is Kali Linux.



Well, Backtrack and it’s replacement, Kali, include a large collection of hacking and penetration testing tools.
Built-In Hacking and Penetration Testing Tools

I’m going to talk about warnings or cautions on using these tools. Let’s assume you use any kind of tools from BT or Kali Linux. You tried or launched some kind of attack to damage the database of a company or you tried to create a problem in public network/private network. You will likely be in real trouble and may be charged/punished, depending on your crime.

So, never ever create a problem for anyone. What I suggest is, learn how these tools work within your own virtual lab or environment and become a defense genius, security analyst or some kind of network security manager.

-White Hat
This is a category of hacker and those who use these tools in only authorized manners/only after permission. They carry out experiments in their own virtual network and never ever touch or destroy the property of other people.

-Authorized Environment
If a company calls you for penetration testing or vulnerability assessment action, you’re not allowed to open up a Toolset box of Backtrack/Kali and start launching them. Rather, you have to work under some guidelines and written permissions. If we try more, we may get into trouble. So, it’s better to ask before crossing given outlines.

Using Backtrack/Kali for good purposes will definitely improve the overall security of the system or network.


That’s it for the first part. For the next part, we will get our hands dirty with Kali Linux Terminal, i.e. Command Lines of Kali Linux. Don’t forget to watch my YouTube video on this part. I’ll show you the interface of Kali Linux, tools and more cool slides and stuff.

Video link : http://youtu.be/xYQdLdn2GSo

Feedback is sweet. Please leave a comment on how I can get clear and awesome for you in next training series 🙂

Share with Friends
Use Cybytes and
Tip the Author!
Share with Friends
Ready to share your knowledge and expertise?
  1. Good job keep on going.

  2. Thanks for the effort, this is really helpful.

  3. It´s good to see somebody takes time to help beginners get a first look at Kali Linux, thanks and congrats man!

Page 2 of 2«12
Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge


We recommend always using caution when following any link

Are you sure you want to continue?