Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:01,240 --> 00:00:07,090
Linux is one of the best Linux distribution for penetration testing.
2
00:00:07,690 --> 00:00:15,860
And most people who's working in this field prefers to use colonics on any other platform.
3
00:00:16,330 --> 00:00:23,860
And the reason is that they are preferring such distribution it's because it has a lot of built in tools
4
00:00:24,400 --> 00:00:31,140
and it keeps getting updated to install it and you frequently update it to the tools and upgrades them
5
00:00:31,150 --> 00:00:36,560
as well as going to see now to navigate into Canada next.
6
00:00:36,600 --> 00:00:44,470
We have a main menu here that include all the main penetration testing tools categorized.
7
00:00:44,700 --> 00:00:53,100
So you have information gathering tools were all the major tools that is used for information gathering
8
00:00:53,400 --> 00:01:05,260
ourself multi go many many tools well on our servers and map and map anything related or anything that
9
00:01:05,260 --> 00:01:08,540
you can use for Gezer information about victim ourselves.
10
00:01:08,590 --> 00:01:15,040
Some of them are a graphical interface some of them are command line but it was going through them and
11
00:01:15,110 --> 00:01:17,940
Checksum vulnerability analysis.
12
00:01:17,950 --> 00:01:24,310
You have a lot of tools that will allow you to identify as a vulnerability in any target like Nick to
13
00:01:24,820 --> 00:01:32,740
like and map different kinds of tool for vulnerability analysis web application analysis zos tools that
14
00:01:32,740 --> 00:01:40,780
allow you to scan a web application and look for the vulnerability into web application like OS zap
15
00:01:40,780 --> 00:01:47,370
or like through three interceptor programs.
16
00:01:47,380 --> 00:01:49,690
So many many of those too.
17
00:01:50,740 --> 00:01:57,670
We have the database that risk assessment tools that allow you to assess or to evaluate the database
18
00:01:58,300 --> 00:02:03,120
exploitation password cracking password attack tools that are allowed to collect.
19
00:02:03,310 --> 00:02:09,410
So all the tools are here and they are categorized by type.
20
00:02:09,550 --> 00:02:15,320
Now all I know is that during this course we will not be covering all the tools.
21
00:02:15,340 --> 00:02:22,630
But I will encourage you actually to go yourself and try to navigate on those tool and see how they
22
00:02:22,630 --> 00:02:23,970
are working.
23
00:02:24,250 --> 00:02:32,390
And I'm going to give you some guidelines during this training on how to navigate into a new tool.
24
00:02:32,410 --> 00:02:39,250
You don't need to memorize steps you don't need to memorize how to do specific task but what you need
25
00:02:39,250 --> 00:02:47,380
to learn from this course besides the basic core of the course is how if you saw it tools that seem
26
00:02:47,440 --> 00:02:52,320
interesting how to open it and how to start learning about the story.
27
00:02:53,680 --> 00:02:57,630
We will be using most of the time a common line.
28
00:02:57,700 --> 00:03:05,500
We still have a lot of graphical tools but I believe if you learn the command line and how to use the
29
00:03:05,500 --> 00:03:08,660
command lines that will be much more useful for you.
30
00:03:09,100 --> 00:03:15,580
So don't worry if you are spending too much time get to use or get to learn command line and get yourself
31
00:03:15,910 --> 00:03:17,200
familiar with the command line.
32
00:03:17,200 --> 00:03:22,860
This actually will help you during this course and during any penetration testing in the future.
33
00:03:23,080 --> 00:03:28,840
So most of the time you'll be going to the terminal and you're going to start writing down calm and
34
00:03:28,840 --> 00:03:30,920
getting some results from that.
35
00:03:31,180 --> 00:03:39,130
Also when you first install Linux you will find that some of the major tool that like for instance the
36
00:03:39,180 --> 00:03:40,520
played Meta's plate.
37
00:03:40,650 --> 00:03:43,320
We're going to have a full section about me at this point.
38
00:03:43,810 --> 00:03:48,730
But instead of keep searching inside Ximena or typing commands you can open it from here right away
39
00:03:49,370 --> 00:03:53,400
or you have the Armytage which is a product for me to supply it.
40
00:03:53,410 --> 00:03:59,430
But the graphical interface instead of command line or suite and so on.
41
00:03:59,440 --> 00:04:09,140
So this is like a shortcut menu from where you can open some of the tools we have also the setting for
42
00:04:09,360 --> 00:04:17,250
for Linux and other tools that allow you to configure that as a regular operating system.
43
00:04:17,250 --> 00:04:26,550
Changing the background configures a sound changing the display and you can get that from sitting here
44
00:04:26,640 --> 00:04:29,890
which should present like a control panel.
45
00:04:30,270 --> 00:04:37,200
We also have a browser here that will allow you to browse the internet and going to different website
46
00:04:37,260 --> 00:04:40,140
and navigate and so on.
47
00:04:40,140 --> 00:04:48,570
So when you open Linux for the first time in any case it's very familiar or very similar to Microsoft
48
00:04:48,570 --> 00:04:49,350
Windows.
49
00:04:49,770 --> 00:04:53,530
It's not a common line anymore.
50
00:04:54,540 --> 00:04:58,550
So it's open graphically and it's quite easy to use.
51
00:04:58,560 --> 00:05:02,360
So start spent sometimes navigating here and there.
52
00:05:02,790 --> 00:05:12,480
And we're going to focus about some specific tools that we get that will help us in our course now also
53
00:05:12,510 --> 00:05:20,870
I want to clarify things the fine system we have here like a file manager so that you can open
54
00:05:24,640 --> 00:05:32,740
it or go and it will choose a different folder inside your home directory you have the home you have
55
00:05:32,740 --> 00:05:35,850
the desktop you have the document you have to download same.
56
00:05:35,860 --> 00:05:36,900
Exactly.
57
00:05:39,060 --> 00:05:42,250
Structure like Windows.
58
00:05:42,420 --> 00:05:48,040
But after all Linux has a specific structure set is different than Windows.
59
00:05:48,060 --> 00:05:49,680
I mean this is your home directory.
60
00:05:49,680 --> 00:05:51,470
It's very similar to INS.
61
00:05:51,480 --> 00:05:58,920
I mean if you go to Microsoft Windows and you open your your your home folder you'll see that you almost
62
00:05:58,920 --> 00:06:03,480
have the same folder which is a desk top download document picture music and so on.
63
00:06:03,480 --> 00:06:12,570
So each home folder in Linux or Windows have the same component but in Linux the main filing system
64
00:06:12,630 --> 00:06:13,510
are different.
65
00:06:13,590 --> 00:06:21,030
And if you took my Linux course on my second hacking course I explained this part and just by going
66
00:06:21,030 --> 00:06:29,420
to as a location here and you go to computer you will see the structure of the filing systems that are
67
00:06:29,430 --> 00:06:36,480
where we have some folders and this is actually in any Linux distribution not just Kenni but any Linux
68
00:06:36,900 --> 00:06:44,310
where we have been has all the comment on said reboot has the file needed to put the system the ATC
69
00:06:44,730 --> 00:06:53,220
all has all the configuration file network configuration display configuration password all the configuration
70
00:06:53,220 --> 00:06:53,580
file.
71
00:06:53,580 --> 00:06:58,390
Allen says see the amount Zawar for instance has all the logs.
72
00:06:58,650 --> 00:07:04,380
So you need to go through the basic structure of Linux to be aware because later on if you need to check
73
00:07:04,380 --> 00:07:11,050
a log that has some error you will be checking in the folder.
74
00:07:11,280 --> 00:07:16,630
If you need to go through some configuration file you need to go to the ATC and so on.
75
00:07:18,600 --> 00:07:24,360
So each user has their own home folder but you need to know the basic structure is a hierarchical Xenix
76
00:07:24,910 --> 00:07:28,810
all the user home folder are under home.
77
00:07:28,890 --> 00:07:35,100
So they spend about how many users you have you'll find under whom all each user has its own home folders
78
00:07:35,100 --> 00:07:40,470
that has a subfolder which is the home and desktop and document and download and so on.
79
00:07:40,470 --> 00:07:48,950
So this is the filing system of Linux during this course you don't need to go that deep but truly it's
80
00:07:48,950 --> 00:07:53,330
not a Linux course it's many penetration testing course and Android penetration testing.
81
00:07:53,340 --> 00:07:59,790
But still you know get to learn more about the filing system and how and how Linux work definitely will
82
00:07:59,790 --> 00:08:00,570
help you.
83
00:08:00,900 --> 00:08:03,020
But this is not the scope of this course.
9311
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.