All language subtitles for 001 Welcome-en

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt-PT Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese Download
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 0 00:00:01.020 --> 00:00:05.700 Hello and welcome to this introductory course for Kali Linux for hackers. 1 00:00:05.700 --> 00:00:11.250 We have designed this course to introduce aspiring hackers to the Linux operating system and in particular 2 00:00:11.250 --> 00:00:13.790 to the Kali Linux operating system. 3 00:00:13.800 --> 00:00:17.190 So if you're brand new to Linux. You've never used it before. 4 00:00:17.220 --> 00:00:19.010 or you've never used Kali before 5 00:00:19.020 --> 00:00:21.000 This is the perfect course for you. 6 00:00:21.240 --> 00:00:26.820 We're going to be building up on some basic skills and moving up gradually in difficulty until 7 00:00:26.820 --> 00:00:29.840 you become proficient and very comfortable with Linux. 8 00:00:29.850 --> 00:00:34.680 This is not an advanced course though you're not going to be doing any super difficult stuff. 9 00:00:34.680 --> 00:00:41.450 And rebuilding Linux kernel and all that crazy stuff we hear about we're not going to be doing that. 10 00:00:41.490 --> 00:00:47.150 Our objective from this horse is to make you as comfortable as possible with Linux operating systems. 11 00:00:47.280 --> 00:00:54.660 So if you encounter one during an unethical hacking engagement you know exactly what to do. Or if you decide 12 00:00:54.660 --> 00:01:00.000 to use Linux at home for example instead of Windows you'd be comfortable with using it, setting it up 13 00:01:00.300 --> 00:01:04.590 and doing the day to day tasks that you do with your Windows operating system. 14 00:01:04.590 --> 00:01:09.280 First let me start by saying Linux is really not that scary. 15 00:01:09.420 --> 00:01:13.520 It really isn't. A lot of people when they see the command line they freak out. To them 16 00:01:13.520 --> 00:01:15.470 this is like a nightmare. 17 00:01:15.480 --> 00:01:21.570 What I want to do is I want to take this nightmare and show you how pretty and cute and lovely It could 18 00:01:21.570 --> 00:01:22.180 be. 19 00:01:22.320 --> 00:01:28.210 And I want to give you the fundamentals and the basics and the foundations so you can build up on those 20 00:01:28.230 --> 00:01:34.340 gradually and if you wish so you can keep advancing until you become a Linux ninja. 21 00:01:34.590 --> 00:01:38.610 You might be wondering and asking yourself what do I have to really do it? Do I really have to learn Linux? 22 00:01:38.610 --> 00:01:41.390 the next ethical hacking for beginners course. 23 00:01:41.410 --> 00:01:44.260 And we didn't even touch Linux. 24 00:01:44.400 --> 00:01:47.500 The only way we got exposed to it was when we have to undo it. 25 00:01:47.500 --> 00:01:50.920 Towards the end of the course and we broke into the net the support the machine. 26 00:01:51.120 --> 00:01:53.510 So I really need to learn yes. 27 00:01:53.640 --> 00:01:57.650 And here's why what most hacking tools are Linux based. 28 00:01:57.660 --> 00:02:02.550 So if you're somebody who wants to take you to ethical hacking case seriously you absolutely definitely 29 00:02:02.550 --> 00:02:06.780 must learn the next it will make your life so much easier. 30 00:02:06.780 --> 00:02:12.570 Trust me it isn't that difficult at first but by the end of this course I can guarantee you that you're 31 00:02:12.570 --> 00:02:18.030 going to be falling in love with the next when you see the kind of things and tricks that you can do. 32 00:02:18.210 --> 00:02:22.460 So it will start to wonder how on earth did I do that without Linux before. 33 00:02:22.620 --> 00:02:25.970 Needless to say you will also face the next science. 34 00:02:25.980 --> 00:02:31.170 We saw that in the hacking for beginners course and you are going to be continuously seeing that throughout 35 00:02:31.170 --> 00:02:32.820 your career as an ethical hacker. 36 00:02:32.940 --> 00:02:37.460 So you must absolutely know your way around the science. 37 00:02:37.470 --> 00:02:42.190 Speaking of targets you might think that Linux is only on Linux servers. 38 00:02:42.210 --> 00:02:48.180 Well you'd be surprised as you can find this operating system for example did you know that Android 39 00:02:48.300 --> 00:02:53.820 is built on Linux and the future we might be releasing a course on Android hacking if you don't know 40 00:02:53.820 --> 00:02:57.720 Linux you're going to struggle with that course but if you're comfortable with the next I'm not saying 41 00:02:57.720 --> 00:03:02.430 an expert and I'm saying an advanced user if you're just comfortable with Linux you're comfortable with 42 00:03:02.430 --> 00:03:05.430 the fundamentals that we're going to be teaching in the schools. 43 00:03:05.520 --> 00:03:12.600 You'll find yourself saying that the Android cores very comfortably not all the Android wireless controllers 44 00:03:13.000 --> 00:03:19.520 firewalls even TVs your PlayStation there are so many devices that are based in the next. 45 00:03:19.560 --> 00:03:21.290 It's all around you. 46 00:03:21.540 --> 00:03:23.980 You might not know it but it really is. 47 00:03:24.240 --> 00:03:25.520 So trust me on this. 48 00:03:25.560 --> 00:03:30.470 Get comfortable with the next and you will be doing yourself a huge favor. 49 00:03:30.480 --> 00:03:35.760 This course is going to be focused on CAD that does not mean that whatever we learn is not usable on 50 00:03:35.760 --> 00:03:40.470 other Linux systems of course it will be 90 percent of the things that we're going to be talking about 51 00:03:40.470 --> 00:03:41.340 in this course. 52 00:03:41.370 --> 00:03:42.190 You can use one. 53 00:03:42.210 --> 00:03:47.610 And in the next system of it I want you to do this course on Kallie so you can start familiarizing yourself 54 00:03:47.610 --> 00:03:48.470 with it. 55 00:03:48.470 --> 00:03:51.730 It is built on a Linux distribution called dvn. 56 00:03:51.810 --> 00:03:55.280 It's built for penetration testing and for forensics analysis. 57 00:03:55.350 --> 00:04:03.650 It has over 300 tools meaning that this operating system is not suited for investors. 58 00:04:03.690 --> 00:04:09.810 It's designed it's built its architecture for the businesses and forensics analysts. 59 00:04:09.960 --> 00:04:13.970 If you are not interested in the same Cali is not for you. 60 00:04:14.040 --> 00:04:21.360 So for a second and think about that if you really are in Gaddi don't use can download any other Linux 61 00:04:21.360 --> 00:04:21.990 version. 62 00:04:21.990 --> 00:04:23.650 You can still follow up with this course. 63 00:04:23.700 --> 00:04:26.330 Absolutely no problem with that at all. 64 00:04:26.470 --> 00:04:29.670 But maybe you want to get used to another distribution. 65 00:04:29.670 --> 00:04:36.930 There's a ton more for example that had is one that you constantly see in enterprises in your enterprise 66 00:04:36.930 --> 00:04:42.510 or at work you use Redhat you want want to get Fedora for example which is the free version of Redhat 67 00:04:42.780 --> 00:04:43.220 if you want. 68 00:04:43.220 --> 00:04:44.820 I use linux at home. 69 00:04:44.820 --> 00:04:50.370 You might want to get to it has one of the prettiest graphical user interfaces and it's super easy to 70 00:04:50.370 --> 00:04:51.370 use. 71 00:04:51.420 --> 00:04:55.550 So if you're ready to carry on I need to keep this in mind. 72 00:04:55.620 --> 00:05:02.900 This course builds up on a lot of concepts from the hacking for beginners course for example when we 73 00:05:02.900 --> 00:05:11.790 talk about things like IP addresses ports services FTB server web server S-sh server and so on. 74 00:05:12.020 --> 00:05:16.430 I am going with the assumption that you already know what that is. 75 00:05:16.430 --> 00:05:20.900 If you do not know please go and review the hacking for beginners course. 76 00:05:21.140 --> 00:05:24.290 If you haven't done the course already please go and do it. 77 00:05:24.290 --> 00:05:27.980 Make sure you are comfortable with these concepts before we proceed. 78 00:05:28.010 --> 00:05:32.860 Our focus in this course is on Linux commands and Linux configuration and so on. 79 00:05:32.870 --> 00:05:37.900 I don't want to be wasting a lot of time explaining what an IP address is that's already been explained 80 00:05:37.910 --> 00:05:42.020 in other courses because we have a lot of ground to cover. 81 00:05:42.350 --> 00:05:50.480 A lot but have a first week log on Caddy's interface and then we'll dive straight away into some basic 82 00:05:50.480 --> 00:05:54.510 commands so you can get comfortable with navigating around the system. 83 00:05:54.530 --> 00:06:00.380 Then we're going to be looking at how to manage packages how to install software remove software. 84 00:06:00.380 --> 00:06:06.410 We're going to then look at how we can identify and compress files and directories that were going to 85 00:06:06.410 --> 00:06:10.070 be looking at one of my favorite topics wildcards. 86 00:06:10.070 --> 00:06:15.070 Following that I'm going to show you how you can get help if you ever find yourself stuck. 87 00:06:15.140 --> 00:06:20.590 You don't know what a command does or what command to use how you can get ahead and sort it out. 88 00:06:20.630 --> 00:06:26.200 All of that is part one or two as well. 89 00:06:26.200 --> 00:06:32.090 When they get a little bit deeper it will start with something light and I'll introduce you to a text 90 00:06:32.090 --> 00:06:33.850 editing tool called Nano. 91 00:06:33.890 --> 00:06:37.310 Then we're going to be looking at some basic network configuration. 92 00:06:37.310 --> 00:06:44.780 Following that we start having some fun with configuring services such as this age web servers and so 93 00:06:44.780 --> 00:06:44.960 on. 94 00:06:44.960 --> 00:06:52.010 You'll be turning your Linux box into a web server and a sage and we'll look at users and groups and 95 00:06:52.010 --> 00:06:55.150 how we can control those and the permissions around them. 96 00:06:55.220 --> 00:07:00.630 Once we're done we'll look at the process management how we can control processes stop them Background 97 00:07:00.700 --> 00:07:01.160 them. 98 00:07:01.160 --> 00:07:04.020 We're going to be doing some really cool stuff with processes. 99 00:07:04.250 --> 00:07:08.920 And last but not least we'll look at our direction and pipings. 100 00:07:08.960 --> 00:07:15.680 I'm going to be showing you some practical examples from my day to day work things that I use when I'm 101 00:07:15.680 --> 00:07:17.620 doing my job as a dentist. 102 00:07:17.840 --> 00:07:20.120 And that will be part two. 103 00:07:20.120 --> 00:07:22.710 There is one more Pyat employed today. 104 00:07:22.790 --> 00:07:28.310 We're going to take everything that we learned and we're going to put it together to build the next 105 00:07:28.310 --> 00:07:35.600 target we're going to be downloading a minimal 1:02 version and very small tiny Linux and we're going 106 00:07:35.600 --> 00:07:41.510 to build that up from scratch in a way that it's vulnerable to a particular attack. 107 00:07:41.510 --> 00:07:46.280 I'm going to show you how Akkad the target system for the web application fundamentals course if you've 108 00:07:46.280 --> 00:07:52.130 done that course at the end there there's a virtual machine that I ask you to download and to hack. 109 00:07:52.160 --> 00:07:55.910 I'm going to show you how I created this virtual machine for you. 110 00:07:56.150 --> 00:08:01.580 And then I'm going to show you how we can use delimits comments to hack this machine and achieve our 111 00:08:01.580 --> 00:08:02.380 targets. 112 00:08:02.540 --> 00:08:08.590 Before we move into the next section this is a slide that is quite unique to this course. 113 00:08:08.630 --> 00:08:10.690 This is the boss exploitations light. 114 00:08:10.760 --> 00:08:16.730 Whenever you see the slide in any section this is a note or a slide that tells you how you can use the 115 00:08:16.730 --> 00:08:19.870 information presented in that particular section. 116 00:08:20.040 --> 00:08:23.820 After you compromise the horse to expand your control. 117 00:08:23.900 --> 00:08:29.900 In other words if you are in an ethical hacking engagements and you come across a Linux system that 118 00:08:29.900 --> 00:08:36.290 you've managed to successfully get into you compromised that Linux machine compromising it is not the 119 00:08:36.290 --> 00:08:37.550 end of this story. 120 00:08:37.760 --> 00:08:44.120 There's a lot more that can be done after you compromise the machine because normally you wouldn't compromise 121 00:08:44.120 --> 00:08:49.580 the machine but the system administrators have it switched on you wouldn't be able to get access as 122 00:08:49.580 --> 00:08:49.880 root. 123 00:08:49.880 --> 00:08:56.140 Straight away you will get access as long as use it and you will need to do some homework. 124 00:08:56.150 --> 00:09:02.060 You need to do some digging around to be able to find a vulnerability through which you can escalate 125 00:09:02.060 --> 00:09:06.580 your privileges and become rude and take full control over your system to do that. 126 00:09:06.630 --> 00:09:10.620 You're going to be needing some of the techniques that are going to be explaining in the scores. 127 00:09:10.640 --> 00:09:16.040 So whenever you see the most exploitation slide pay special attention to it because it will give you 128 00:09:16.040 --> 00:09:23.450 some tips and tricks that you can use that you compromise in next post haste or set up like you do before 129 00:09:23.450 --> 00:09:24.430 we get started. 130 00:09:24.440 --> 00:09:28.410 We're going to download and install Kalli on a virtual machine. 131 00:09:28.430 --> 00:09:30.760 We've seen this before in other voices. 132 00:09:30.770 --> 00:09:34.260 We know what a virtual machine is and we know how to set it up. 133 00:09:34.280 --> 00:09:35.810 If you've not seen this before. 134 00:09:35.830 --> 00:09:39.520 A virtual machine emulates the functionality of a computer system. 135 00:09:39.530 --> 00:09:42.790 It's as if you have a separate physical computer. 136 00:09:43.370 --> 00:09:48.510 So you install this virtual machine software usually the AM word or virtual box for example. 137 00:09:48.680 --> 00:09:55.400 And once that set up on you let's say Windows system inside that virtual machine you can install another 138 00:09:55.430 --> 00:10:00.230 operating system and that will be treated as a completely separate opaque system. 139 00:10:00.310 --> 00:10:07.600 So what I'd like you to do is either install the word or virtual box and then install Kalli on either 140 00:10:07.600 --> 00:10:08.680 of them. 141 00:10:08.680 --> 00:10:12.690 I'm going to attach a link to a YouTube tutorial that I've done a while back. 142 00:10:12.700 --> 00:10:18.310 It is slightly outdated it's an older version of Kalli but it still works perfectly fine. 143 00:10:18.370 --> 00:10:22.710 So go ahead get it set up once you ready it can get started with the course. 144 00:10:22.750 --> 00:10:25.250 I really hope you're excited about this as I am.15760

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.