Linux (part 2) Kali Linux Commands
Video Activity
This unit covers Kali Linux commands such as pwd and man ls. Kali Linux is different from other programs in that it only has root users and the best way to learn Kali Linux is by being an unprivileged user. Kali Linux is specifically made for Pen testing and is not a program that is commonly used in everyday programming.
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Video Description
This unit covers Kali Linux commands such as pwd and man ls. Kali Linux is different from other programs in that it only has root users and the best way to learn Kali Linux is by being an unprivileged user. Kali Linux is specifically made for Pen testing and is not a program that is commonly used in everyday programming.
Video Transcription
00:04
here to start with just a little bit of lyrics.
00:07
I find that a lot of people who start out including me and I'm very pin testing don't have a lot of Lennox experience. I had maybe used it twice honestly, on a lot of the course material that I was looking at. Just assumed that I already knew Lennox. So do you want to start with just a little bit of legs?
00:26
You can follow this course just with
00:28
this much Lennox, but I would encourage you if you're going to continue with pin testing whatever works for you, a class of book just using it and your everyday life to get familiar with the next. Because a lot of the tools for contesting Arlyn it's only I mean, there are some that. Do you have a Windows version? There's even some that are Windows only,
00:47
but primarily a lot of your developers.
00:50
For your particular you're open source tools that is gonna be the next base. So it's certainly worth knowing. And then on top of that, you'll probably run into some Lennox target. So people generally use windows for their work stations. But a lot of your
01:03
servers, databases, websites. Things like that are going to be Lennox space. So probably need to know Cem
01:11
the next effects. We have a lineage target in our environment here. Well, someone does one. So I'm starting out here on my Callie Lennox again. The passwords without is tour, so log in route
01:25
and then password tour
01:27
route backwards. Must've assault was You are, of course, welcome to change. You want to remember what it is,
01:34
and I already have my command line open. Let's get rid of that. So up here at the top, this is our terminal.
01:42
Well, we can just open that up here. You can if you want to make it bigger so you can
01:47
use you, man.
01:49
Which, of course, you don't have to. It makes it nicer on the screen right now. Might be a bit much
01:53
about that,
01:56
and you know so it changed the colors and hope a city and beings get of the dragon, which I generally do for screen shots. And
02:04
I report so doesn't have, like part dragon in there
02:07
have looks a little silly
02:08
out of context. So those are lyrics command line,
02:13
so we can do
02:15
anything on this system straight from the command line. And it's
02:19
used, in my opinion, a good deal easier to use than the Windows Command line and power Shell on Windows is nice, and we'll look at power. Shell previously were in the class, but
02:30
on our older window systems, we don't have power shell, so we're stuck with
02:35
a certain amount of unhappiness If we end up with command line, I said Soo in this system, unless were really good with the Windows Command line. I think the Lenox command line is much easier to deal with so we can put in our commands. For instance, we could do
02:51
he W d'oh!
02:53
That's just a command. It's short for print. Working directory
02:58
are the salt directory. Since where are the user route? Is slash root
03:04
and
03:05
we could find out more information about a command for something called the Man Pages Man short for manual
03:13
man
03:14
C W D
03:15
would have more information from the name of the current working directory, but also some additional options.
03:23
Another one would be a way
03:25
man l s list directory contents
03:30
most information about the files and also has some options like Dash a will. Do not ignore entries starting with dots that won't ignore hidden directories.
03:42
Lots of other ones here, Let's see
03:45
one more
03:50
dash Little l use a long listing formats a different form out for the output.
03:55
So say I want to do say, l s
04:00
let's just start with the roots So that's gonna be the root of the file system that slash and see our working director here with slash root that's in route structurally. But let's do it. L s on the roof.
04:13
There's all our directories in the roots. You kind of think of. The Lenox file system is a tree. So we've got root slides at the top, and then it's got all these branches and some of these air directories like Here's our root directory.
04:26
I got some other was, well, user of our says 10 Mount up
04:32
media live home losses, stuff.
04:35
Um, so we could also do
04:40
the last dash A
04:42
That'll show us. It doesn't look like we have many hidden directories here. We just have the dot, which is the current directory and dot dot, which is the parent.
04:53
And I also do does l for the long form out. So this shows us additional information.
05:00
It was always me. And I wonder, um, So what we have here is this is actually the file permissions on these of these files.
05:09
So we have read, right? Execute, read, right. Execute, read, right, excuse or three different groups. We'll get to that in just a second
05:18
on then. We have think that's how many links there are to it.
05:25
And then owner,
05:27
the group
05:29
size
05:30
and
05:31
last modified date and then the name.
05:38
So a little bit more information there
05:42
and we can navigate around the file system. Like again we're still up
05:46
flies route. If I wanted to go to say route, I could do
05:50
she d slosh change directory CD beginning to do man TV There is no man injury for CD so that when we might have to
06:00
check out the Internet for more information, we can always Google is, well, man pages to be
06:04
a little bit unattractive to read.
06:09
So
06:10
sometimes the Internet is easier.
06:13
Yeah,
06:13
either way.
06:15
And so we can also do this goodbye massaged route.
06:20
I can also do
06:21
if I wanted to do cd dot thought. Remember that dot dot is the parent
06:27
so that would be the equivalent of sea route. Because we're in slash route that will take me to the parrot, which is gonna be route
06:34
so sly.
06:39
Yeah,
06:42
So she was going back to
06:45
again. We can also do
06:47
CD onto roots desktop
06:51
and I could do like CD dot, dot, dot thought. So that will take me two parents up. So it'll take me back to route and go into a different directories like at sea with my one long here
07:04
accuse, etc. I want to go to the etc directory
07:09
do that
07:10
phenomena etc.
07:13
But we can move around again in conflict of it at a tree. You don't have to be familiar with where everything is and what all of the directories mean.
07:21
Really. You can just know that
07:25
you're in your root directory or flies route your home directory for route by the fault and slashes the
07:32
beginning of the file system Amount is where we mount drives,
07:39
tempest, temporary files.
07:42
There's lots of different things in there,
07:47
so use your privileges. How about that? Then? We are your route.
07:53
You are
07:54
home directory is lodged route. There's also
07:58
plush home. We saw
08:01
home actually didn't have anything in it. Right now, Callie lyrics is interesting
08:07
Lennox system and that it only has the route user, which is really uncommon for Lennox. The best practice for using Linux is too
08:15
Who l every day today. Tasks. Um, as an unprivileged user on only used route, which is equivalent of system on Windows. You're
08:28
almighty, completely controlling the file system
08:31
user for
08:35
activities that require route privileges. So that way we wouldn't
08:41
Hopefully, we wouldn't manage to destroy anything if we're route all the time and then say I
08:48
used to command called r. M.
08:50
Um, so if I went into route,
08:54
I said are in
08:56
Dash Rs
08:58
and
09:01
I let that run.
09:03
What would happen is that I would actually just leave my entire follow system. So it's actually kind of a joke that you see on
09:11
hacking boards all the time. It's like teach me howto hack,
09:15
tell people to go into their Lennox system, and dio are in the jar s so that's gonna tell it to force Riker. Shively remove files of going to actually remove the entire file system in that case, because from the root directory and since we're route,
09:31
that would be perfectly legal. There would be nothing to stop that. We have that privilege, whereas if I was just the normal user, I wouldn't be able to distill you the file system. I'd only be able to access files that I have permission
09:46
to work with.
09:48
That's a
09:48
pretty good example of why we shouldn't use route all the time. Callie is a little bit different.
09:54
It's not for one and everyday use. Operating system is specifically built for pin testing, and most pin testicles actually are going to require route privileges.
10:05
Shut up network. So here's and listen on the network and crack passwords and also Mother saying so and not everything is going to require rip religious, but it's fair amount of than do so. I guess it just makes it easier. You know, I didn't write Kelly, but that's as far as I can remember always been. The case is that
10:22
it's always been
10:24
the Route user
10:26
course we can at another user if we want to
10:30
on and may not be necessary for Callie because we are working with other Lennox systems who probably have some other user that is not root
10:39
did you add User and Georgia
10:43
Drake password for Georgia. Always used password for these examples that that's a really terrible password. I realized that you should never use the same password. So I use in production.
10:54
But he's a better posture than password. But remember what it is, of course,
10:58
being fill in these values I always deceiving. Plank. Is this information correct? Yes.
11:05
Now we have a user called Georgia.
11:07
His password is password, in my case.
11:11
So what we can dio is I could change users to that user. Georgia s we're going to do with Sue.
11:18
Yeah,
11:22
that may be the user. Georgia, who see my prompt has changed here. Now I'm Georgia. Callie.
11:26
You know, if I wanted to do an ad user
11:31
James
11:33
So the ad use your command doesn't exist, but we know it does. We just used it.
11:39
While Georgia doesn't have root privileges, Georgia has limited user privileges. So Georgia actually doesn't have the ability to add users for the file system. Nor should she is just a regular user. So what we would need to do in this case
11:54
is actually use something called Sue do
11:58
pseudo.
12:01
Well, the exit and go back to route Sided exit, and that took me back to my roots. Prompt.
12:07
And what I want to do
12:09
is ad Georgia to the Seward route, so groups
12:13
are just groups of users. The user can be in multiple groups, and once it's group is
12:20
sue doers
12:22
and that is people who are allowed to basically pretend to be route, these users can
12:28
basically request route privileges on a temporary basis so they can perform
12:33
command. Such Azad user.
12:35
So what I want to do as route
12:39
do you add user
12:41
again? Georgia.
12:43
And then I want to add
12:46
Georgia in two.
12:46
You go
12:50
that added dirt into this, you know, group.
12:54
Well, now if I drop back down to Georgia
12:56
instead of doing
12:58
add user James says command not found a new shoot. Oh,
13:05
bad user,
13:07
James.
13:09
You know, it gives me a little warning about using pseudo. It does, in fact, give us room privileges weaken, do bad things with it. We should not.
13:18
Minute problems means for my password. I don't have to have the root password for this. I need to have George's password, which is my password.
13:26
So then that allows us to use the ad user commands.
13:31
We could have this user James
13:35
through the file system. So then, after we've done Sue, do
13:41
we lose our privileges immediately? So it's only so that one command that we keep this route privileges in our back to being a normal user.
13:50
Hopefully, we won't be able to destroy the file system now.
Up Next
Similar Content