Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
0
00:00:01.020 --> 00:00:05.700
Hello and welcome to this introductory course for Kali Linux for hackers.
1
00:00:05.700 --> 00:00:11.250
We have designed this course to introduce aspiring hackers to the Linux operating system and in particular
2
00:00:11.250 --> 00:00:13.790
to the Kali Linux operating system.
3
00:00:13.800 --> 00:00:17.190
So if you're brand new to Linux. You've never used it before.
4
00:00:17.220 --> 00:00:19.010
or you've never used Kali before
5
00:00:19.020 --> 00:00:21.000
This is the perfect course for you.
6
00:00:21.240 --> 00:00:26.820
We're going to be building up on some basic skills and moving up gradually in difficulty until
7
00:00:26.820 --> 00:00:29.840
you become proficient and very comfortable with Linux.
8
00:00:29.850 --> 00:00:34.680
This is not an advanced course though you're not going to be doing any super difficult stuff.
9
00:00:34.680 --> 00:00:41.450
And rebuilding Linux kernel and all that crazy stuff we hear about we're not going to be doing that.
10
00:00:41.490 --> 00:00:47.150
Our objective from this horse is to make you as comfortable as possible with Linux operating systems.
11
00:00:47.280 --> 00:00:54.660
So if you encounter one during an unethical hacking engagement you know exactly what to do. Or if you decide
12
00:00:54.660 --> 00:01:00.000
to use Linux at home for example instead of Windows you'd be comfortable with using it, setting it up
13
00:01:00.300 --> 00:01:04.590
and doing the day to day tasks that you do with your Windows operating system.
14
00:01:04.590 --> 00:01:09.280
First let me start by saying Linux is really not that scary.
15
00:01:09.420 --> 00:01:13.520
It really isn't. A lot of people when they see the command line they freak out. To them
16
00:01:13.520 --> 00:01:15.470
this is like a nightmare.
17
00:01:15.480 --> 00:01:21.570
What I want to do is I want to take this nightmare and show you how pretty and cute and lovely It could
18
00:01:21.570 --> 00:01:22.180
be.
19
00:01:22.320 --> 00:01:28.210
And I want to give you the fundamentals and the basics and the foundations so you can build up on those
20
00:01:28.230 --> 00:01:34.340
gradually and if you wish so you can keep advancing until you become a Linux ninja.
21
00:01:34.590 --> 00:01:38.610
You might be wondering and asking yourself what do I have to really do it? Do I really have to learn Linux?
22
00:01:38.610 --> 00:01:41.390
the next ethical hacking for beginners course.
23
00:01:41.410 --> 00:01:44.260
And we didn't even touch Linux.
24
00:01:44.400 --> 00:01:47.500
The only way we got exposed to it was when we have to undo it.
25
00:01:47.500 --> 00:01:50.920
Towards the end of the course and we broke into the net the support the machine.
26
00:01:51.120 --> 00:01:53.510
So I really need to learn yes.
27
00:01:53.640 --> 00:01:57.650
And here's why what most hacking tools are Linux based.
28
00:01:57.660 --> 00:02:02.550
So if you're somebody who wants to take you to ethical hacking case seriously you absolutely definitely
29
00:02:02.550 --> 00:02:06.780
must learn the next it will make your life so much easier.
30
00:02:06.780 --> 00:02:12.570
Trust me it isn't that difficult at first but by the end of this course I can guarantee you that you're
31
00:02:12.570 --> 00:02:18.030
going to be falling in love with the next when you see the kind of things and tricks that you can do.
32
00:02:18.210 --> 00:02:22.460
So it will start to wonder how on earth did I do that without Linux before.
33
00:02:22.620 --> 00:02:25.970
Needless to say you will also face the next science.
34
00:02:25.980 --> 00:02:31.170
We saw that in the hacking for beginners course and you are going to be continuously seeing that throughout
35
00:02:31.170 --> 00:02:32.820
your career as an ethical hacker.
36
00:02:32.940 --> 00:02:37.460
So you must absolutely know your way around the science.
37
00:02:37.470 --> 00:02:42.190
Speaking of targets you might think that Linux is only on Linux servers.
38
00:02:42.210 --> 00:02:48.180
Well you'd be surprised as you can find this operating system for example did you know that Android
39
00:02:48.300 --> 00:02:53.820
is built on Linux and the future we might be releasing a course on Android hacking if you don't know
40
00:02:53.820 --> 00:02:57.720
Linux you're going to struggle with that course but if you're comfortable with the next I'm not saying
41
00:02:57.720 --> 00:03:02.430
an expert and I'm saying an advanced user if you're just comfortable with Linux you're comfortable with
42
00:03:02.430 --> 00:03:05.430
the fundamentals that we're going to be teaching in the schools.
43
00:03:05.520 --> 00:03:12.600
You'll find yourself saying that the Android cores very comfortably not all the Android wireless controllers
44
00:03:13.000 --> 00:03:19.520
firewalls even TVs your PlayStation there are so many devices that are based in the next.
45
00:03:19.560 --> 00:03:21.290
It's all around you.
46
00:03:21.540 --> 00:03:23.980
You might not know it but it really is.
47
00:03:24.240 --> 00:03:25.520
So trust me on this.
48
00:03:25.560 --> 00:03:30.470
Get comfortable with the next and you will be doing yourself a huge favor.
49
00:03:30.480 --> 00:03:35.760
This course is going to be focused on CAD that does not mean that whatever we learn is not usable on
50
00:03:35.760 --> 00:03:40.470
other Linux systems of course it will be 90 percent of the things that we're going to be talking about
51
00:03:40.470 --> 00:03:41.340
in this course.
52
00:03:41.370 --> 00:03:42.190
You can use one.
53
00:03:42.210 --> 00:03:47.610
And in the next system of it I want you to do this course on Kallie so you can start familiarizing yourself
54
00:03:47.610 --> 00:03:48.470
with it.
55
00:03:48.470 --> 00:03:51.730
It is built on a Linux distribution called dvn.
56
00:03:51.810 --> 00:03:55.280
It's built for penetration testing and for forensics analysis.
57
00:03:55.350 --> 00:04:03.650
It has over 300 tools meaning that this operating system is not suited for investors.
58
00:04:03.690 --> 00:04:09.810
It's designed it's built its architecture for the businesses and forensics analysts.
59
00:04:09.960 --> 00:04:13.970
If you are not interested in the same Cali is not for you.
60
00:04:14.040 --> 00:04:21.360
So for a second and think about that if you really are in Gaddi don't use can download any other Linux
61
00:04:21.360 --> 00:04:21.990
version.
62
00:04:21.990 --> 00:04:23.650
You can still follow up with this course.
63
00:04:23.700 --> 00:04:26.330
Absolutely no problem with that at all.
64
00:04:26.470 --> 00:04:29.670
But maybe you want to get used to another distribution.
65
00:04:29.670 --> 00:04:36.930
There's a ton more for example that had is one that you constantly see in enterprises in your enterprise
66
00:04:36.930 --> 00:04:42.510
or at work you use Redhat you want want to get Fedora for example which is the free version of Redhat
67
00:04:42.780 --> 00:04:43.220
if you want.
68
00:04:43.220 --> 00:04:44.820
I use linux at home.
69
00:04:44.820 --> 00:04:50.370
You might want to get to it has one of the prettiest graphical user interfaces and it's super easy to
70
00:04:50.370 --> 00:04:51.370
use.
71
00:04:51.420 --> 00:04:55.550
So if you're ready to carry on I need to keep this in mind.
72
00:04:55.620 --> 00:05:02.900
This course builds up on a lot of concepts from the hacking for beginners course for example when we
73
00:05:02.900 --> 00:05:11.790
talk about things like IP addresses ports services FTB server web server S-sh server and so on.
74
00:05:12.020 --> 00:05:16.430
I am going with the assumption that you already know what that is.
75
00:05:16.430 --> 00:05:20.900
If you do not know please go and review the hacking for beginners course.
76
00:05:21.140 --> 00:05:24.290
If you haven't done the course already please go and do it.
77
00:05:24.290 --> 00:05:27.980
Make sure you are comfortable with these concepts before we proceed.
78
00:05:28.010 --> 00:05:32.860
Our focus in this course is on Linux commands and Linux configuration and so on.
79
00:05:32.870 --> 00:05:37.900
I don't want to be wasting a lot of time explaining what an IP address is that's already been explained
80
00:05:37.910 --> 00:05:42.020
in other courses because we have a lot of ground to cover.
81
00:05:42.350 --> 00:05:50.480
A lot but have a first week log on Caddy's interface and then we'll dive straight away into some basic
82
00:05:50.480 --> 00:05:54.510
commands so you can get comfortable with navigating around the system.
83
00:05:54.530 --> 00:06:00.380
Then we're going to be looking at how to manage packages how to install software remove software.
84
00:06:00.380 --> 00:06:06.410
We're going to then look at how we can identify and compress files and directories that were going to
85
00:06:06.410 --> 00:06:10.070
be looking at one of my favorite topics wildcards.
86
00:06:10.070 --> 00:06:15.070
Following that I'm going to show you how you can get help if you ever find yourself stuck.
87
00:06:15.140 --> 00:06:20.590
You don't know what a command does or what command to use how you can get ahead and sort it out.
88
00:06:20.630 --> 00:06:26.200
All of that is part one or two as well.
89
00:06:26.200 --> 00:06:32.090
When they get a little bit deeper it will start with something light and I'll introduce you to a text
90
00:06:32.090 --> 00:06:33.850
editing tool called Nano.
91
00:06:33.890 --> 00:06:37.310
Then we're going to be looking at some basic network configuration.
92
00:06:37.310 --> 00:06:44.780
Following that we start having some fun with configuring services such as this age web servers and so
93
00:06:44.780 --> 00:06:44.960
on.
94
00:06:44.960 --> 00:06:52.010
You'll be turning your Linux box into a web server and a sage and we'll look at users and groups and
95
00:06:52.010 --> 00:06:55.150
how we can control those and the permissions around them.
96
00:06:55.220 --> 00:07:00.630
Once we're done we'll look at the process management how we can control processes stop them Background
97
00:07:00.700 --> 00:07:01.160
them.
98
00:07:01.160 --> 00:07:04.020
We're going to be doing some really cool stuff with processes.
99
00:07:04.250 --> 00:07:08.920
And last but not least we'll look at our direction and pipings.
100
00:07:08.960 --> 00:07:15.680
I'm going to be showing you some practical examples from my day to day work things that I use when I'm
101
00:07:15.680 --> 00:07:17.620
doing my job as a dentist.
102
00:07:17.840 --> 00:07:20.120
And that will be part two.
103
00:07:20.120 --> 00:07:22.710
There is one more Pyat employed today.
104
00:07:22.790 --> 00:07:28.310
We're going to take everything that we learned and we're going to put it together to build the next
105
00:07:28.310 --> 00:07:35.600
target we're going to be downloading a minimal 1:02 version and very small tiny Linux and we're going
106
00:07:35.600 --> 00:07:41.510
to build that up from scratch in a way that it's vulnerable to a particular attack.
107
00:07:41.510 --> 00:07:46.280
I'm going to show you how Akkad the target system for the web application fundamentals course if you've
108
00:07:46.280 --> 00:07:52.130
done that course at the end there there's a virtual machine that I ask you to download and to hack.
109
00:07:52.160 --> 00:07:55.910
I'm going to show you how I created this virtual machine for you.
110
00:07:56.150 --> 00:08:01.580
And then I'm going to show you how we can use delimits comments to hack this machine and achieve our
111
00:08:01.580 --> 00:08:02.380
targets.
112
00:08:02.540 --> 00:08:08.590
Before we move into the next section this is a slide that is quite unique to this course.
113
00:08:08.630 --> 00:08:10.690
This is the boss exploitations light.
114
00:08:10.760 --> 00:08:16.730
Whenever you see the slide in any section this is a note or a slide that tells you how you can use the
115
00:08:16.730 --> 00:08:19.870
information presented in that particular section.
116
00:08:20.040 --> 00:08:23.820
After you compromise the horse to expand your control.
117
00:08:23.900 --> 00:08:29.900
In other words if you are in an ethical hacking engagements and you come across a Linux system that
118
00:08:29.900 --> 00:08:36.290
you've managed to successfully get into you compromised that Linux machine compromising it is not the
119
00:08:36.290 --> 00:08:37.550
end of this story.
120
00:08:37.760 --> 00:08:44.120
There's a lot more that can be done after you compromise the machine because normally you wouldn't compromise
121
00:08:44.120 --> 00:08:49.580
the machine but the system administrators have it switched on you wouldn't be able to get access as
122
00:08:49.580 --> 00:08:49.880
root.
123
00:08:49.880 --> 00:08:56.140
Straight away you will get access as long as use it and you will need to do some homework.
124
00:08:56.150 --> 00:09:02.060
You need to do some digging around to be able to find a vulnerability through which you can escalate
125
00:09:02.060 --> 00:09:06.580
your privileges and become rude and take full control over your system to do that.
126
00:09:06.630 --> 00:09:10.620
You're going to be needing some of the techniques that are going to be explaining in the scores.
127
00:09:10.640 --> 00:09:16.040
So whenever you see the most exploitation slide pay special attention to it because it will give you
128
00:09:16.040 --> 00:09:23.450
some tips and tricks that you can use that you compromise in next post haste or set up like you do before
129
00:09:23.450 --> 00:09:24.430
we get started.
130
00:09:24.440 --> 00:09:28.410
We're going to download and install Kalli on a virtual machine.
131
00:09:28.430 --> 00:09:30.760
We've seen this before in other voices.
132
00:09:30.770 --> 00:09:34.260
We know what a virtual machine is and we know how to set it up.
133
00:09:34.280 --> 00:09:35.810
If you've not seen this before.
134
00:09:35.830 --> 00:09:39.520
A virtual machine emulates the functionality of a computer system.
135
00:09:39.530 --> 00:09:42.790
It's as if you have a separate physical computer.
136
00:09:43.370 --> 00:09:48.510
So you install this virtual machine software usually the AM word or virtual box for example.
137
00:09:48.680 --> 00:09:55.400
And once that set up on you let's say Windows system inside that virtual machine you can install another
138
00:09:55.430 --> 00:10:00.230
operating system and that will be treated as a completely separate opaque system.
139
00:10:00.310 --> 00:10:07.600
So what I'd like you to do is either install the word or virtual box and then install Kalli on either
140
00:10:07.600 --> 00:10:08.680
of them.
141
00:10:08.680 --> 00:10:12.690
I'm going to attach a link to a YouTube tutorial that I've done a while back.
142
00:10:12.700 --> 00:10:18.310
It is slightly outdated it's an older version of Kalli but it still works perfectly fine.
143
00:10:18.370 --> 00:10:22.710
So go ahead get it set up once you ready it can get started with the course.
144
00:10:22.750 --> 00:10:25.250
I really hope you're excited about this as I am.15760
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.