Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:01,310 --> 00:00:01,780
All right.
2
00:00:01,820 --> 00:00:08,570
We've got Kelly Linux installed were successfully logged in and now we're going to learn some Linux
3
00:00:08,930 --> 00:00:11,570
before we get started with learning Linux.
4
00:00:11,570 --> 00:00:18,050
Let's take a brief minute or two to actually just look at clinics and what it has to offer and also
5
00:00:18,050 --> 00:00:23,080
see why it is the go to distribution when it comes to pen testing.
6
00:00:23,090 --> 00:00:31,350
So here we have our screen and you could see from the sidebar here that there are some favorites.
7
00:00:31,400 --> 00:00:38,750
Now you can use Linux like a gooey so graphical user interface basically meaning that we can just point
8
00:00:38,750 --> 00:00:42,800
and click on something like this folder here we'll bring it files.
9
00:00:42,800 --> 00:00:46,370
Now these files look similar if you're a Linux user or a Mac user.
10
00:00:46,370 --> 00:00:49,270
This is just a goofy way of accessing files.
11
00:00:49,280 --> 00:00:49,580
Right.
12
00:00:49,580 --> 00:00:53,640
So we can go into documents or downloads or however we want to do it.
13
00:00:53,750 --> 00:00:57,890
We've got access to our folder in our files right here on the left side.
14
00:00:58,310 --> 00:01:04,100
We've also got this Firefox now Firefox used to be ISOs all so you can see like a little bit of a weasel
15
00:01:04,100 --> 00:01:05,020
in here.
16
00:01:05,330 --> 00:01:11,540
But now it is known as Firefox and this is our web browser and we also have this thing called the terminal.
17
00:01:11,540 --> 00:01:16,130
We're gonna be very intimate with the terminal here starting in the next video.
18
00:01:16,160 --> 00:01:22,940
So the terminal is a way to utilize accessing everything that we have here including these folders and
19
00:01:22,950 --> 00:01:27,870
these files without ever using a graphical interface to do so.
20
00:01:27,890 --> 00:01:33,410
So we'll learn a lot about the terminal and why it's so powerful and how to utilize it in our day to
21
00:01:33,410 --> 00:01:34,870
day pen testing.
22
00:01:35,060 --> 00:01:41,120
And we have some other tools here as well we've got a little text editor or a notepad we've got Metis
23
00:01:41,120 --> 00:01:46,490
flight which is a framework we're going to become very familiar with with pen testing throughout this
24
00:01:46,490 --> 00:01:47,420
course.
25
00:01:47,570 --> 00:01:50,030
We've got brb sleep which I promise we'll use as well.
26
00:01:50,030 --> 00:01:53,490
That's more geared towards web application penetration testing.
27
00:01:53,600 --> 00:02:00,170
We've got Xen map which is also the graphical version of a tool called n map that's for network scanning
28
00:02:00,170 --> 00:02:02,000
we'll get into that as well.
29
00:02:02,000 --> 00:02:05,350
And we've got this wonderful tool here called cherry tree.
30
00:02:05,360 --> 00:02:08,780
Now we have covered keep no and we've covered green shot.
31
00:02:08,780 --> 00:02:11,120
This is a another option.
32
00:02:11,120 --> 00:02:16,430
I told you guys that we're going to be looking at Cherry Tree and we install Linux here it is.
33
00:02:16,430 --> 00:02:17,990
So you can just.
34
00:02:18,070 --> 00:02:25,310
Or you could set up nodes here would you say cast and now you can take your nodes or take some notes
35
00:02:25,790 --> 00:02:31,310
and then you can add additional nodes on top of that test too.
36
00:02:31,340 --> 00:02:35,560
And now you have a baby node here or a child node or whatever you want to call it.
37
00:02:35,570 --> 00:02:42,200
So this is very nice for keeping a good notebook especially if you want the inside of your virtual machine.
38
00:02:42,200 --> 00:02:47,750
The only advice against this that I have is that keeping your notebook inside your virtual machine if
39
00:02:47,750 --> 00:02:52,150
your virtual machine crashes or you don't have a backup of it you lose all of your notes.
40
00:02:52,160 --> 00:02:56,610
So me preferably I like to keep my notes outside of my VM.
41
00:02:56,690 --> 00:03:00,300
However I do know a lot of people that keep their notes inside their VM.
42
00:03:00,320 --> 00:03:06,770
Here's a really really easy way to do it with cherry tree is very point and click and you can actually
43
00:03:06,770 --> 00:03:10,850
just import screenshots pretty easily as well into here.
44
00:03:10,850 --> 00:03:15,380
So another option instead of keep note is cherry tree.
45
00:03:15,380 --> 00:03:17,030
And it works really really well.
46
00:03:17,060 --> 00:03:24,860
So again very important to keep notes and I do like that offensive security has put the cherry tree
47
00:03:24,860 --> 00:03:28,040
on the favorites panel for this version of Cal Linux.
48
00:03:28,040 --> 00:03:29,030
So I'm going to close this out.
49
00:03:29,040 --> 00:03:30,760
Am I going to say that.
50
00:03:30,770 --> 00:03:38,000
Couple of things to point out so we can hit this little bar here to show all of our applications and
51
00:03:38,060 --> 00:03:42,260
you could see all the applications that we have installed could scroll through and there's quite a bit
52
00:03:42,860 --> 00:03:47,400
but a better way to actually look at this is to go ahead and just hit escape.
53
00:03:47,630 --> 00:03:54,110
And if we go up to applications you at the top we could see that everything is put together in phases.
54
00:03:54,110 --> 00:04:00,740
So we're going to talk about the phases of ethical hacking and for example step one is information gathering.
55
00:04:00,740 --> 00:04:07,130
So they've got some tools here for information gathering related to related to it.
56
00:04:07,160 --> 00:04:07,460
Right.
57
00:04:07,460 --> 00:04:09,530
So all these nice tools.
58
00:04:09,530 --> 00:04:13,430
But let's say that we wanted to do we want to do reporting.
59
00:04:13,430 --> 00:04:16,010
Well they have got some reporting tools down here.
60
00:04:16,130 --> 00:04:20,610
They've got social engineering tools forensics reverse engineering wireless attacks.
61
00:04:20,690 --> 00:04:26,870
So basically they have all kinds of built in tools here for penetration testing and that is what makes
62
00:04:26,870 --> 00:04:29,420
this a penetration testing distribution.
63
00:04:29,450 --> 00:04:31,230
That's what makes this so awesome.
64
00:04:31,310 --> 00:04:39,670
So all these favorites here comes power load ahead with so many different tools so catalytic source
65
00:04:39,670 --> 00:04:40,220
them.
66
00:04:40,280 --> 00:04:43,460
The other off option out there is called Parrot.
67
00:04:43,460 --> 00:04:47,750
You might hear a lot of people talk about parrot parrot is up and coming.
68
00:04:47,750 --> 00:04:48,800
I've used it a bit.
69
00:04:48,800 --> 00:04:49,670
I do not like it.
70
00:04:49,670 --> 00:04:51,530
I've had some performance issues with it.
71
00:04:51,590 --> 00:04:58,000
So my preference is to go to is Kelly Linux but both offer a lot of the same features.
72
00:04:58,010 --> 00:05:03,310
So from here what we're gonna go ahead and do is we're going to now open up a terminal and we're going
73
00:05:03,310 --> 00:05:11,170
to maximize it and we are just going to take some time and actually get familiar with this command line.
74
00:05:11,200 --> 00:05:17,300
So I will catch you in the next video when we started to actually learn how to navigate the file system
75
00:05:17,690 --> 00:05:20,170
and utilize Linux to our advantage.
7863
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.