All language subtitles for 1. Exploring Kali Linux

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:01,310 --> 00:00:01,780 All right. 2 00:00:01,820 --> 00:00:08,570 We've got Kelly Linux installed were successfully logged in and now we're going to learn some Linux 3 00:00:08,930 --> 00:00:11,570 before we get started with learning Linux. 4 00:00:11,570 --> 00:00:18,050 Let's take a brief minute or two to actually just look at clinics and what it has to offer and also 5 00:00:18,050 --> 00:00:23,080 see why it is the go to distribution when it comes to pen testing. 6 00:00:23,090 --> 00:00:31,350 So here we have our screen and you could see from the sidebar here that there are some favorites. 7 00:00:31,400 --> 00:00:38,750 Now you can use Linux like a gooey so graphical user interface basically meaning that we can just point 8 00:00:38,750 --> 00:00:42,800 and click on something like this folder here we'll bring it files. 9 00:00:42,800 --> 00:00:46,370 Now these files look similar if you're a Linux user or a Mac user. 10 00:00:46,370 --> 00:00:49,270 This is just a goofy way of accessing files. 11 00:00:49,280 --> 00:00:49,580 Right. 12 00:00:49,580 --> 00:00:53,640 So we can go into documents or downloads or however we want to do it. 13 00:00:53,750 --> 00:00:57,890 We've got access to our folder in our files right here on the left side. 14 00:00:58,310 --> 00:01:04,100 We've also got this Firefox now Firefox used to be ISOs all so you can see like a little bit of a weasel 15 00:01:04,100 --> 00:01:05,020 in here. 16 00:01:05,330 --> 00:01:11,540 But now it is known as Firefox and this is our web browser and we also have this thing called the terminal. 17 00:01:11,540 --> 00:01:16,130 We're gonna be very intimate with the terminal here starting in the next video. 18 00:01:16,160 --> 00:01:22,940 So the terminal is a way to utilize accessing everything that we have here including these folders and 19 00:01:22,950 --> 00:01:27,870 these files without ever using a graphical interface to do so. 20 00:01:27,890 --> 00:01:33,410 So we'll learn a lot about the terminal and why it's so powerful and how to utilize it in our day to 21 00:01:33,410 --> 00:01:34,870 day pen testing. 22 00:01:35,060 --> 00:01:41,120 And we have some other tools here as well we've got a little text editor or a notepad we've got Metis 23 00:01:41,120 --> 00:01:46,490 flight which is a framework we're going to become very familiar with with pen testing throughout this 24 00:01:46,490 --> 00:01:47,420 course. 25 00:01:47,570 --> 00:01:50,030 We've got brb sleep which I promise we'll use as well. 26 00:01:50,030 --> 00:01:53,490 That's more geared towards web application penetration testing. 27 00:01:53,600 --> 00:02:00,170 We've got Xen map which is also the graphical version of a tool called n map that's for network scanning 28 00:02:00,170 --> 00:02:02,000 we'll get into that as well. 29 00:02:02,000 --> 00:02:05,350 And we've got this wonderful tool here called cherry tree. 30 00:02:05,360 --> 00:02:08,780 Now we have covered keep no and we've covered green shot. 31 00:02:08,780 --> 00:02:11,120 This is a another option. 32 00:02:11,120 --> 00:02:16,430 I told you guys that we're going to be looking at Cherry Tree and we install Linux here it is. 33 00:02:16,430 --> 00:02:17,990 So you can just. 34 00:02:18,070 --> 00:02:25,310 Or you could set up nodes here would you say cast and now you can take your nodes or take some notes 35 00:02:25,790 --> 00:02:31,310 and then you can add additional nodes on top of that test too. 36 00:02:31,340 --> 00:02:35,560 And now you have a baby node here or a child node or whatever you want to call it. 37 00:02:35,570 --> 00:02:42,200 So this is very nice for keeping a good notebook especially if you want the inside of your virtual machine. 38 00:02:42,200 --> 00:02:47,750 The only advice against this that I have is that keeping your notebook inside your virtual machine if 39 00:02:47,750 --> 00:02:52,150 your virtual machine crashes or you don't have a backup of it you lose all of your notes. 40 00:02:52,160 --> 00:02:56,610 So me preferably I like to keep my notes outside of my VM. 41 00:02:56,690 --> 00:03:00,300 However I do know a lot of people that keep their notes inside their VM. 42 00:03:00,320 --> 00:03:06,770 Here's a really really easy way to do it with cherry tree is very point and click and you can actually 43 00:03:06,770 --> 00:03:10,850 just import screenshots pretty easily as well into here. 44 00:03:10,850 --> 00:03:15,380 So another option instead of keep note is cherry tree. 45 00:03:15,380 --> 00:03:17,030 And it works really really well. 46 00:03:17,060 --> 00:03:24,860 So again very important to keep notes and I do like that offensive security has put the cherry tree 47 00:03:24,860 --> 00:03:28,040 on the favorites panel for this version of Cal Linux. 48 00:03:28,040 --> 00:03:29,030 So I'm going to close this out. 49 00:03:29,040 --> 00:03:30,760 Am I going to say that. 50 00:03:30,770 --> 00:03:38,000 Couple of things to point out so we can hit this little bar here to show all of our applications and 51 00:03:38,060 --> 00:03:42,260 you could see all the applications that we have installed could scroll through and there's quite a bit 52 00:03:42,860 --> 00:03:47,400 but a better way to actually look at this is to go ahead and just hit escape. 53 00:03:47,630 --> 00:03:54,110 And if we go up to applications you at the top we could see that everything is put together in phases. 54 00:03:54,110 --> 00:04:00,740 So we're going to talk about the phases of ethical hacking and for example step one is information gathering. 55 00:04:00,740 --> 00:04:07,130 So they've got some tools here for information gathering related to related to it. 56 00:04:07,160 --> 00:04:07,460 Right. 57 00:04:07,460 --> 00:04:09,530 So all these nice tools. 58 00:04:09,530 --> 00:04:13,430 But let's say that we wanted to do we want to do reporting. 59 00:04:13,430 --> 00:04:16,010 Well they have got some reporting tools down here. 60 00:04:16,130 --> 00:04:20,610 They've got social engineering tools forensics reverse engineering wireless attacks. 61 00:04:20,690 --> 00:04:26,870 So basically they have all kinds of built in tools here for penetration testing and that is what makes 62 00:04:26,870 --> 00:04:29,420 this a penetration testing distribution. 63 00:04:29,450 --> 00:04:31,230 That's what makes this so awesome. 64 00:04:31,310 --> 00:04:39,670 So all these favorites here comes power load ahead with so many different tools so catalytic source 65 00:04:39,670 --> 00:04:40,220 them. 66 00:04:40,280 --> 00:04:43,460 The other off option out there is called Parrot. 67 00:04:43,460 --> 00:04:47,750 You might hear a lot of people talk about parrot parrot is up and coming. 68 00:04:47,750 --> 00:04:48,800 I've used it a bit. 69 00:04:48,800 --> 00:04:49,670 I do not like it. 70 00:04:49,670 --> 00:04:51,530 I've had some performance issues with it. 71 00:04:51,590 --> 00:04:58,000 So my preference is to go to is Kelly Linux but both offer a lot of the same features. 72 00:04:58,010 --> 00:05:03,310 So from here what we're gonna go ahead and do is we're going to now open up a terminal and we're going 73 00:05:03,310 --> 00:05:11,170 to maximize it and we are just going to take some time and actually get familiar with this command line. 74 00:05:11,200 --> 00:05:17,300 So I will catch you in the next video when we started to actually learn how to navigate the file system 75 00:05:17,690 --> 00:05:20,170 and utilize Linux to our advantage. 7863

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.