< All Advanced Penetration Testing Notes

testing223 | Advanced Penetration Testing | Module 1 - Linux

By: testing223 | Related Course: Advanced Penetration Testing | Published: April 2, 2018 | Modified: April 3, 2018
Join Cybrary


linux experience is kinda needed/assumed

many tools are linux only

most linux tools are open sourced

many servers, dB, web services are linux based

pwd – print working directory

man – manual 

ls -l – brings up file permissions 

/dir – transport towards directory without

kali only has root user

for most day-to-day use, you should only need to use an unprivileged profile

rm -rf – deletes entire file system, recursively removes all files

many pentesting tools require root access

adduser [name] – creates a new profile 

su [name] – switches the profile

adduser needs to have root access

sudo – allows you to pretend to be root, have to add profile to a sudo group

adduser [name] sudo – creates new sudo profile



can type full paths

everything in linux is a file

touch – creates a file, what type? 

mkdir – making directory

cp – moves a file (have to type accurate path from current directory)

mv – renames file 

rm – removes a file

echo – prints something from shell

echo …. > – inputs to a file, overrides data

cat – reads a file

>> – appends, not override

nano has lower learning curve apparently



read – write – execute

first set – owner, second set – group, third group – everyone else

chmod – alter permissions of a file? look @ manual

| piping 

grep – looks for text w/ regular expression in given file

netstat -antp – ? shows protocols, IP, foreign address, state. Network sockets



< All Advanced Penetration Testing Notes
Join Cybrary

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?