foundational aspects of Kali Linux, focusing on commands, the file
system, and Linux administration. San Malu, a cyber security
consultant, guides beginners through the essential skills for ethical
hacking, including copying, renaming, and navigating files, both during
a hands-on practice session and with various methods such as
calculation, quotes, and anecdotes.
The tutorial begins with an overview of Kali Linuxs capabilities,
emphasizing its 300+ pre-installed hacking and forensic tools, and
proceeds with terminal customization for better readability. Basic
commands such as who am I, date, PWD, and ls, as well as ways to
list directories including hidden ones, are demonstrated.
Understanding Linux users is also highlighted, explaining normal, root,
and system users, alongside their access permissions. The course
emphasizes security, explaining regular user accounts prevent
unauthorized system access and updates with the apt command.
Students practice installing and uninstalling applications using apt,
including complex commands like ip a and usbctl.
The importance of understanding network interfaces is covered with ip
a, showcasing user and system names, as well as IP addresses, with
advanced ls options and directory navigation using cd. The Nano text
editors use for creating and modifying text files is demonstrated,
alongside command line utilities for file and directory creation and
deletion make Dr, cd, rm, etc..
Permission for performing administrative tasks is discussed,
introducing sudo and su commands. Students practice using these
commands with examples like installing VLC and other applications.
The chapter also explains network management with the ip a
command, and introduces the Aircrack-ng suite, detailing Wi-Fi