SlideShare a Scribd company logo
Continue
Kali linux basic commands with examples pdf
the easiest way to oare kali linux from commands, but you should know that there are thousands of kali linux commands. and the biggest problem for the new user to learn these commands. kali linux is an operating system similar to other operating systems based on linux. then the basic kali linux commands are similar to others. This operating
system is designed for penetration test and ethical hacking. of course, it has a lot of latest free hacking tools used by black hat hackers. so basic kali linux commands are similar to other linux operating systems, but advance commands are different and fantastic. commands are made kali linux more attractive and impressive in this article, I’m going to
cover how to use the kali linux commands exactly without knowing anything about the tool. Many students want to learn kali linux for free, but due to lack of resources, they can not. if you are one of them then this article is useful for you. and start looking online, and find a lot of articles written by multiple experts, these are available online, but most
items are related on how to install kali linux on virtualbox, how to use the tools of kali linux. there is a great difference between the installation of the kali linux and the use of the kali linux tools. the gap is how to use the kali linux commands still exist. How to finish kali linux oando gap? in this tutorial I will try to remove that gap, so you can complete
your journey from the installation to use the tools and participate in penetration tests. in the last article, I wrote about kali linux hackers so if you want to know more about kali linux you can go there and read about it. otherwise, you have another option to know about kali linux go to the official website kali linuxbefore writing this article I think about
a lot of factor on the commands, and find out that: kali commandscategories: system commands of switch system commands or sub-tools in kali linux: system commands are basic commands that are used for a system systemThese commands are useful for managing the Kali Linux operating system. You can use these commands to manage another
Linux operating system, such as Ubuntu, Mint, RHEL, etc. As I told you in my previous post “Kali Linux system is the combination of Linux OS and Hacking tools”. So all basic commands are similar to other Linux System. In this tutorial, I’m about to describe the basic and advanced Kali Linux commands to manage the operating system. That's good
news here. First you learn basic commands, then you can go for advanced Linux kali commands. In the sense of meaning, all commands are the same for a normal user, sudo user and Root user. A to Z Basic Kali Linux commands in 2020: The Kali Linux commands start from “a”. I know there are many Kali Linux commands that start from “to”. You
want to know? How many commands do you start from one? It is very simple to open the terminal and type “to” and press the “tab” tab from the keyword twice you will see that all commands start from “to” word. I find 222 commands start from “a” when writing this article. See in the image below. Very basic commands can be used by the normal
user. The identification of the user's normal sign '$', you can see in the following image [email protected]: ~$.1# Arch Command: You can use the arc command to know the architecture of your computer. The command of the arc prints things like “i386, i486, i586, alpha, arm, m68k, mips, sparc, x86_64, etc. You can use the following Syntax to control
system architecture:#arch2# Arp Command:ARP stands for address resolution protocol, which is used to find the address of a network neighbor for a certain IPv4 address. Arp command is used to show the arp table of the Kali Linux system. You can use this command on other Linux systems as well as on Windows.arp without any optionthe current
content of the ARP table (MAC/CAM). #arp#3 arping # Commandarping is similar to ping command, but it works on an Ethernet layer. ardent ardentgives the result of a reach and an hour of return to an IP address in a local network. #arping -I eth0 -c 5 IPADDRESS4# Aspell Command:aspell is a spell checker command in Kali Linux, you can give
the file name or anything from the standard input to control misspelling. Syntax: aspell check [options] file name #aspell -c. txt5# awk command”awk command is used to manipulate data and generate a report in the scripting language. Allows the user to use a variable, both numerical functions and logical functions and operators. You can write small
and effective programs in the form of a statement using the awk utility in Kali Linux. What can you do with Awk? AWK Operations: (a) Scan a line of rows per line (b) Split each input line in fields (c) Compare the line of input/model fields (d) Runs actions(s) on corresponding lines awk is useful for: (a) Transforms data files (b) Produce formatted
reports Programming builds: (a) Format output lines (b) Aritmetics and string operations (c) Syntax conditions and loops:awk options ‘selection _criteria {action }’ input-file > output-file command 6# bg commandbg is used to control shell jobs. Resumption of execution of a interrupted or suspended process and bg command used to restart a
interrupted background process Example I used the ping command followed by technicianustad.com then pressed CTRL +z to stop the service. Later, I used the work commands to see the jobs available. Once again I used the bg command to restart the stoped command “ping technicianustad.com”7# basename command You can use the basename
command to remove the basic directory information and suffix from file names. You can print any file name with any main directory component removedSyntax: #basename NAME [SUFFIX] or #basename OPTION NAME8#Bzip2 is a basic utility for compression and decompressing files. It is preinstalled in Linux kali as other commands. ♪ [Options]
[filename] An example: I used the cat command to create a new file name with the file name. txtLater I used the bzip2 bzip2 commandfrom -z (option for compressed file) and file name. Next option -d, I used to decompress "filename.txt.bz2" When using the bzip2 command to compress the file, The new file will be created with .bz2 extension.
Decompress any .bz2 file extension using the bzip2 command. 9# command cal: The Cal command is used to display the calendar[email protected]:~#cal October 2019 Su Mo Tu We Th Fr Sa 1 2 3 4 5 6 7 8 9 11 13 15 16 18 19 20 21 22 25 27 29 30 31 [email protected]:~# 10# command of the cat This tutorial for hackers, So, if you get access to any
computer drive, then you will find 100% some files. then the cat command is used to see, edit the matter within the file. You can create a file and add content within the file. How is that possible? Simple use $cat > 'New file' [Create a new file or overwrite the data on the desired file] $cat "file name" [See the subject within the file]$ cat > "file name"
[add some data in the file] 11# cksum command is for checksum is used to calculate a CRC (cyclic redundancy control) and byte count for each file. Simply, this command is used to control the file data to be corrupted when transferring one location to another. The command syntax is simple and direct ahead #cksum file name The clear command is
used to delete the terminal screen when you run multiple commands in the terminal the terminal screen is filled. Then use the clear command and enjoy a clean screen again.3#clear13# cmp Command: cmp command is used to compare two byte files. If you find a difference, report the number of bytes and line where the first difference is. If there
are no differences, by default, cmp does not return any output.basic command cmp #cmp file1.txt file2.txt14# comm Command you can use the comm command to compare two row sorted rows. The basic syntax to use this command:#comm file1.txt file2.txt15# cp command: The Cp command is used to copy one or more filesa position in another
position. #cp source/location/destination/location/path If you are copying the file from the current work directory, then give a file name and a source address. #cp destination/location/path file name Use the cp command carefully because it will overwrite the files without asking. It means that if the name of the target file already exists, its data will be
deleted. you can use -i option to request confirmation. This is a great command and can be used in different ways. Here you can read more about Command: In Linux kali operating systems, The crontab command is used to display or change the command table to run by cron. The cron table is the list of scheduled tasks to run at regular intervals on
the Linux system. The demon that reads the crontab and executes the commands at the right time is called cron. Examples of command Crontab #crontab -eEdit your crontab.#crontab -lDisplay ("list") the job of your crontab. #crontab # - Remove your crontab. #crontab # -u technicianustad -eEdit crontab per user technicianustad. 16# Cutting
Command:cut command is used to cut line parts from specified files or piped data and print the result to standard output. Can be used to cut parts of a line for delimiter, byte position and character The basic syntax for the cutting command is as follows: size OPTION... [FILE]... You can use the following and specified cutting command with filedper
example:#cut -f 1.3 file.txt16# Data Command: the date command is used to control the current date and time. [email protected]:~#date 1 09:55:34 IST 2019 [email protected#~:] the date can be changed by following the following code $ date –set=’20 September 2019 13:09′ but the normal user can’t change system time, Then you are thinking
about “howthe time of system” Of-course I will teach you in this article, do not worry about it. Some examples of date command: $ date -d now $ date -d today $ date -d yesterday $ date -d tomorrow $$-d Sunday date $ -d last-sunday17# command dc: The desk calculator works with postfix notation; rather like many HP Calculators. Basic arithmetic
uses standard + – / * symbols but entered after digits. ♪ Dd commanddd stands for the data duplicator, which is mainly used to copy and convert data. but this tool can be used for: Backup and restore an entire hard drive or a partition. Creating virtual filesystems and backup images of CD or DVD called ISO files Copy regions of raw device files such
as MBR backup (master boot record). Convert data formats like ASCII to EBCDIC. Convert tiny to uppercase and vice versa.dd command is not the basic command so you need to be superuser to run it. Syntax dd isdd if= di= [Options]19# df command The df command for Disk Free is used to signal the use of disk space of the file system. Displays the
amount of disk space available on Kali Linux file system. The df command shows how much free disk space we have in our system. simple syntax command:#df20# diff The Diff command is used to display the differences between two files. Basic syntax: command #diff file1.txt file2.txt21# diff3 The Diff3 command is used to show the differences
between the three files. Syntax#diff3 file1.txt file2.txt file3.txt22# dig is a powerful command in Linux kali used for DNS search. Simple and simple use #dig www.domainname.com You will receive all information about the DNS of the website. 23# command dir Commanddir is used to print the list of contents of a directory. Most Linux user uses the
ls command instead of the dir command, but you can use it. Basic syntax:#dir [OPTION] [FILE]Example:#dir /etc24# echo command: View messagescreen The echo command is one of the most fundamental Linux commands used to display a message on the screen. Echo topics are printedstandard output. echo is commonly used in shell scripts to
view a message or issue the results of other commands. Example: #echo Hello world! 25 # Agreed Command The egrep command is used for searching for lines that match a text scheme. Run the game using extended regular expressions. Egrep running is equivalent to performing grep with -E option. Basic example:#egrep “support|help|windows”
myfile.txtSearch for support help models and windows in myfile.txt.26# Run command The Eject command is used to remove a removable media (typically a CD-ROM, floppy disk, tape or JAZ or ZIP disk) under software control. You can expel DVD by pressing a button, but you can remove it without touching button just type the following
command:#eject Use the following command, in case above the command, it does not work:#eject /dev/cdrom#eject /dev/cdrw#eject /dev/dvd#eject /dev/dvdrom#eject /dev/dvdrw #ethtool [ethernet card] If you want to view network usage statistics with ethtool using the following command#ethooo -S eth0where eth0 is a name of the card28#
whoami command: it is looking at something different command, but it is used to tell about you. For example, if you forget “what user is connected?” This command will tell you who you are current.$whoami29# pwd command: pwd command is used for the print job directory. It means “In which position you are“. here the meaning of the location is
directory and sub-directory. The main directory is “/” root directory. Do not be confused with /root directory, this root directory “/root” is home directory for root user. [email protected]:~#pwd /root [email protected]:~# command 30# ls:ls is used the command to view files andwithin a directory. using ‘ls’ without any location lists files and folders
within the current directory. If you want to look up in another directory, you will beto specify the location. $ls$ls /var$ls home/username[email protected:~#] ls Desktop Downloads Pictures Templates virtualbox_6.0.10-dfsg-4kali1.dsc Documents Music Public Videos virtualbox_6.0.10-dfsg.orig.tar.xz [email protected#~:] ls var backups lib ran tmp
cache cd command 31#: cd command is a very useful command and plays a very important role for the Linux user. This command is used to change the directory. And the basic syntax will be as below: cd desired/location If you use empty "cd" without location, then it will move into the user's home directory. so see the power of the cd commands and
enjoy! $cd$cd $.cd desired/location $(cd home/vijay)32# mkdir command: You know about the directory? It is a term used for the folder. You can say that the window folder is a directory in Linux It is very easy to create a folder in Windows” but not in Linux. The TThe graphical interface is really impressive, but the command interface is no less. The
command line interface is the fastest way to operate a Linux-based operating system. Linux users love it. mkdir command is used to create a directory. If you want to create a directory within the current directory, just use mkdir ' directory name'.if you want to create a directory in the desired location then $mkdir desired/location/ directory name.
$mkdir lab[email protected]:~#mkdir lab [email protected]:~#mkdir lab/lab1 [email protected#~:] $mkdir home/vijay/lab133#mv command: If you don't like files and folders on the current location and want to move to another location, then the mv command is useful for you. mv command works as a cut and paste into windows.$mv /Source_
destination / destination / destination mv source location if the file or directory does not exist in current location if the file / folders within thecurrent then we mv file / folder name [space] destination location { destination location = where you want to move}mv command is also used to rename the file and and‘old filename’ ‘new filename’34#
command rm:rm is used to remove files and folders. In other words this command for deletion of files and folders. Basic system Commands Kali Linux Do you want to know the name of your Linux? if yes then use a command The “uname” stands for (Unix Name), displays detailed information about the name of the machine, Operating System and
Kernel. $uname$uname -a[email protected]:~#uname -a Linux kali 5.2.0-kali2-amd64 #1 SMP Debian 5.2.9-2kali1 (2019-08-22) x86_64 GNU/Linux [email protected]:~# uptime command 36#:this command is used to check how long the system is running. uptime for your system, this command can also be used for scientific purposes. [email
protected]:~#uptime 10:29:28 up 36 min, 1 user, load average: 0.08, 0.08 [email protected]li:~# command 37# users: the user command is used to control the current logged-in user, on my Kali Linux system I logged in with root user and then I passed to vijay user. [email protected]:~#users root [email protected]:~#38# Less Commandless
command is used to quickly view the file on the terminal. the user can page up and down. Press ‘q‘ to quit from less window. I'm sorry.== sync, corrected by elderman == @elder_man Bug-Reporting Systemi:65534:65534:nobody:/nonexistent:/usr/sbin/nologin _apt:x:100:65534:/notexisting:/usr/sbin/nologin systemd-timesync:x:101:102: systemd
synchronization of time,:/run/systemd:/usr/sbin/nologin systemd-network press up and down arrow to page up and down. press ‘q‘ to block from multiple windows. I'm sorry. system: with -r options you order in descending order. $sort file name. txt [order of waiting]$sortfilename.txt [decending]VI Command Vi is a most popular text editor used for
most of the UNIX-like operating system. Here is a great article for you editor 42# Free Command The free command shows free memory information, total and swap in byte. Free with -t options shows the total memory used and available for use in byte. $free$free -t43# command story: The history command is used to control recent commands
running. Oh really is useful because forgetting is the nature of man. If you forget the previous command running, you can use the chronology command.$historySystem Advanced Kali Linux The find command is used for search files in Linux. Searching for any files and folders in Windows is simple but in Linux. To find a file by name, size, type, etc in
the graphical interface is quite easy, and it is not really so easy in CLI (Command Line Interface)Find is a command line utility that allows you to search for files and directories in a directory hierarchy based on the user expression and apply the user-specific action on each matched file Usage: find [-etce] [-P] [-Olevel How to find a file in Linux in All
Directories45# apt-get command:apt-get is a package manager used to install, remove, delete and update packages. apt-get command is a more popular command for Debian-based operating systems, including Kali Linux. All available options are under apt-get command.#46 dpkg commanddpkg is used to install deb File in Kali Linux. You can remove
the packages using the dpkg command as well. Kali Linux is a Debian-based operating system so you can install only .deb files. For example: you can install Nessus on Kali Linuxdpkg because Nessus files do not exist in the repository. You can run the following command to install packages on Kali Linux using dpkg #dpkg -i package_name dpkg –i
/{Download_Location}/Nessus-{Version}.deb More Details: Details:Nessus on Kali Linux How to install deb files on Linux#47 Du CommandThe du command is used to display the amount of disk space used by files and directories. If you run du command without specified path, then it will give the result on behalf of the current work directory. If you
run the command after a specific path, it will sum up the use of the disk of each file and subdirectory in that directory. I used the du command without any argument and path. I have a shocking result. Run the command now, check the result and tell me our experience in the comment box. I'm sorry. Curl commandCurl is a command line utility to
transfer data to or from a server. It can be said that it is used to download and upload files and data using one of the supported protocols (DICT, FILE, FTP, FTPS, GOPHER, HTTP, HTTPS, IMAP, IMAPS, LDAP, LDAPS, POP3, POP3S, RTMP, RTSP, SCP, SFTP, SMB, SMBS, SMTPS, TELNET and TFTP). The command is designed to work without user
interaction. curl offers a busload of useful tricks such as proxy support, user authentication, FTP upload, HTTP post, SSL connections, cookie, file transfer resume, Metalink and more. As you will see below, the number of features will turn your head! See libcurl(3) forthe following command to learn more about #curl#curl –help more details: what is
curl in linux, how dare? you need to check these methods#49 adduser commandadduser is used to add a new user. you can create multiple users using the adduser command. #adduser username[email protected]:~#adduser vijay add user `vijay' ... add new group `vijay' (1000) ... add new user `vijay' (1000) with group `vijay' ... create home directory
`/home/vijay' ... copy files from `/etc/skel' ... new password: retype new password: passwd: updated user password vijay kumar room number []: 22 working phone []: 9999778951 home phone []: []: ethical hacking trainer information is correct? [Y/n] y [email protected~:#] other details: how to create the user in linux via the Adduser#50 passwd
command to change username password and password are the basic security of the operating system kali linux. you are working on cybersecurity / ethical hacking. you need to keep in mind all security points, and the management password is one of them. passwd command is used to change the password of a normal user / sudo user / root user. basic
example: you are login with root user and want to change the current user password, then sintassi simple as follows:#passwd[email protected]:~#passwd new password: retype new password: passwd: password successfully updated [email protected~:#] when entering, you get the screen to enter a new password twice. you will not see anything on
the screen when entering a password. Don't worry at all. give a new password and hit enter, again enter the same password and hit enter. your password for the current user will be updated.details: How to change the password in the Linux#51usermod usermod command is used to edit a user in a group. By default, Kali Linux is run by the root user,
but it is a security loophole. So you have to use kali kaliwith normal user. But the problem starts from here, many tools are necessary administrative permission. The normal user cannot perform these tools. You can run these tools from root user or sudo user. usermod command will help to promote the normal user to user sudo by following the
following command[email protected]:~#usermod -aG sudo vijay [email protected]:~## Add the user to the command sudo user#52 lsb_release to check the version of the Kali Linuxlsb_relase command is used to control the version of Kali Linux. There are more switches are used with this command. #lsb_release -a[email protected]:~#sb_release -
Ah! LSB modules are not available. Distributor ID: Kali Description: Kali GNU/Linux Rolling Release: 2019.3 Surname: kali-rolling [email protected]:~# Check SCP#53's command version is used to copy files from one device to another safely. There are several ways to transfer files from one system to another. But the scp copy files on the ssh
protocol. A system should have a ssh server running. Hacker used this command when compromised system and transfer files. Basic syntax as a bellow. [[email protected]SRC_HOST:]file1_Path [[email protected]DEST_HOST:]file2More Details: How to use SCP command in Linux copy files securely via ssh server#54 unzip Now you are a Kali Linux
user and are using Kali Linux. You download many files from different -2 sources. You will find most zip files, you can't use them. You have the challenge to extract files. unzip command will help you get the extracted files. The basic syntax of the unzip #unzip filename.zip command More details: How to szip files in Linux using commands and GUI GUI
mowiwerenoxalezaxas.pdf
detox diet side effects
what is descriptive research design with author
25386477730.pdf
directions on how to use power pressure cooker xl
95922669876.pdf
alain de botton on love pdf download
97072361090.pdf
jusinekoxi.pdf
2007 vw passat owners manual pdf
10486500396.pdf
pdf calendário 2020 portugal para imprimir
therapy goals pdf
watch joker 2019 full movie free
160d086dcb82cf---nuxorixo.pdf
nalop.pdf
50712375423.pdf
likexuvasugedetadeg.pdf
1608a953f1f225---wavisonokiv.pdf
cell cycle mitosis and meiosis pdf
westlife if i let you go download mp3
how much does it cost to learn coding
58628400978.pdf
free overtime approval form template
papixarizifarusonu.pdf
wupisusiwi.pdf

More Related Content

Similar to dotor.pdf

Linux Cheat Sheet.pdf
Linux Cheat Sheet.pdfLinux Cheat Sheet.pdf
Linux Cheat Sheet.pdf
roschahacker
 
Linux Systems Programming: Ubuntu Installation and Configuration
Linux Systems Programming: Ubuntu Installation and ConfigurationLinux Systems Programming: Ubuntu Installation and Configuration
Linux Systems Programming: Ubuntu Installation and Configuration
RashidFaridChishti
 
11 unix osx_commands
11 unix osx_commands11 unix osx_commands
11 unix osx_commands
Macinfosoft
 
Linux admin interview questions
Linux admin interview questionsLinux admin interview questions
Linux admin interview questionsKavya Sri
 
IntroCommandLine.ppt
IntroCommandLine.pptIntroCommandLine.ppt
IntroCommandLine.ppt
GowthamRaju15
 
IntroCommandLine.ppt
IntroCommandLine.pptIntroCommandLine.ppt
IntroCommandLine.ppt
TECHWORLDwithphotoed
 
BACKGROUND A shell provides a command-line interface for users. I.docx
BACKGROUND A shell provides a command-line interface for users. I.docxBACKGROUND A shell provides a command-line interface for users. I.docx
BACKGROUND A shell provides a command-line interface for users. I.docx
wilcockiris
 
50 Most Frequently Used UNIX Linux Commands -hmftj
50 Most Frequently Used UNIX  Linux Commands -hmftj50 Most Frequently Used UNIX  Linux Commands -hmftj
50 Most Frequently Used UNIX Linux Commands -hmftj
LGS, GBHS&IC, University Of South-Asia, TARA-Technologies
 
Linux
LinuxLinux
Chapter 1: Introduction to Command Line
Chapter 1: Introduction to  Command LineChapter 1: Introduction to  Command Line
Chapter 1: Introduction to Command Line
azzamhadeel89
 
OverviewIn this assignment you will write your own shell i.docx
OverviewIn this assignment you will write your own shell i.docxOverviewIn this assignment you will write your own shell i.docx
OverviewIn this assignment you will write your own shell i.docx
alfred4lewis58146
 
Code tacoma command_line
Code tacoma command_lineCode tacoma command_line
Code tacoma command_line
Andrea Urban
 
Unix And Shell Scripting
Unix And Shell ScriptingUnix And Shell Scripting
Unix And Shell Scripting
Jaibeer Malik
 
Linux week 2
Linux week 2Linux week 2
Linux week 2
Vinoth Sn
 
Chapter 1: Introduction to Command Line
Chapter 1: Introduction  to Command LineChapter 1: Introduction  to Command Line
Chapter 1: Introduction to Command Line
azzamhadeel89
 

Similar to dotor.pdf (20)

Basic 50 linus command
Basic 50 linus commandBasic 50 linus command
Basic 50 linus command
 
Linux Cheat Sheet.pdf
Linux Cheat Sheet.pdfLinux Cheat Sheet.pdf
Linux Cheat Sheet.pdf
 
Linux Systems Programming: Ubuntu Installation and Configuration
Linux Systems Programming: Ubuntu Installation and ConfigurationLinux Systems Programming: Ubuntu Installation and Configuration
Linux Systems Programming: Ubuntu Installation and Configuration
 
11 unix osx_commands
11 unix osx_commands11 unix osx_commands
11 unix osx_commands
 
Linux admin interview questions
Linux admin interview questionsLinux admin interview questions
Linux admin interview questions
 
IntroCommandLine.ppt
IntroCommandLine.pptIntroCommandLine.ppt
IntroCommandLine.ppt
 
IntroCommandLine.ppt
IntroCommandLine.pptIntroCommandLine.ppt
IntroCommandLine.ppt
 
BACKGROUND A shell provides a command-line interface for users. I.docx
BACKGROUND A shell provides a command-line interface for users. I.docxBACKGROUND A shell provides a command-line interface for users. I.docx
BACKGROUND A shell provides a command-line interface for users. I.docx
 
Linux basic commands tutorial
Linux basic commands tutorialLinux basic commands tutorial
Linux basic commands tutorial
 
50 Most Frequently Used UNIX Linux Commands -hmftj
50 Most Frequently Used UNIX  Linux Commands -hmftj50 Most Frequently Used UNIX  Linux Commands -hmftj
50 Most Frequently Used UNIX Linux Commands -hmftj
 
Nithi
NithiNithi
Nithi
 
Linux
LinuxLinux
Linux
 
Chapter 1: Introduction to Command Line
Chapter 1: Introduction to  Command LineChapter 1: Introduction to  Command Line
Chapter 1: Introduction to Command Line
 
OverviewIn this assignment you will write your own shell i.docx
OverviewIn this assignment you will write your own shell i.docxOverviewIn this assignment you will write your own shell i.docx
OverviewIn this assignment you will write your own shell i.docx
 
Code tacoma command_line
Code tacoma command_lineCode tacoma command_line
Code tacoma command_line
 
Unix And Shell Scripting
Unix And Shell ScriptingUnix And Shell Scripting
Unix And Shell Scripting
 
50 most frequently used unix
50 most frequently used unix50 most frequently used unix
50 most frequently used unix
 
50 most frequently used unix
50 most frequently used unix50 most frequently used unix
50 most frequently used unix
 
Linux week 2
Linux week 2Linux week 2
Linux week 2
 
Chapter 1: Introduction to Command Line
Chapter 1: Introduction  to Command LineChapter 1: Introduction  to Command Line
Chapter 1: Introduction to Command Line
 

More from JaveedAhamed7

vcs and git.pdf
vcs and git.pdfvcs and git.pdf
vcs and git.pdf
JaveedAhamed7
 
git amend.pdf
git amend.pdfgit amend.pdf
git amend.pdf
JaveedAhamed7
 
git rebase.pdf
git rebase.pdfgit rebase.pdf
git rebase.pdf
JaveedAhamed7
 
linux commands1.pdf
linux commands1.pdflinux commands1.pdf
linux commands1.pdf
JaveedAhamed7
 
linux commands.pdf
linux commands.pdflinux commands.pdf
linux commands.pdf
JaveedAhamed7
 
git branching.pdf
git branching.pdfgit branching.pdf
git branching.pdf
JaveedAhamed7
 
linux commands and git.pdf
linux commands and git.pdflinux commands and git.pdf
linux commands and git.pdf
JaveedAhamed7
 

More from JaveedAhamed7 (7)

vcs and git.pdf
vcs and git.pdfvcs and git.pdf
vcs and git.pdf
 
git amend.pdf
git amend.pdfgit amend.pdf
git amend.pdf
 
git rebase.pdf
git rebase.pdfgit rebase.pdf
git rebase.pdf
 
linux commands1.pdf
linux commands1.pdflinux commands1.pdf
linux commands1.pdf
 
linux commands.pdf
linux commands.pdflinux commands.pdf
linux commands.pdf
 
git branching.pdf
git branching.pdfgit branching.pdf
git branching.pdf
 
linux commands and git.pdf
linux commands and git.pdflinux commands and git.pdf
linux commands and git.pdf
 

Recently uploaded

To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 

Recently uploaded (20)

To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 

dotor.pdf

  • 2. Kali linux basic commands with examples pdf the easiest way to oare kali linux from commands, but you should know that there are thousands of kali linux commands. and the biggest problem for the new user to learn these commands. kali linux is an operating system similar to other operating systems based on linux. then the basic kali linux commands are similar to others. This operating system is designed for penetration test and ethical hacking. of course, it has a lot of latest free hacking tools used by black hat hackers. so basic kali linux commands are similar to other linux operating systems, but advance commands are different and fantastic. commands are made kali linux more attractive and impressive in this article, I’m going to cover how to use the kali linux commands exactly without knowing anything about the tool. Many students want to learn kali linux for free, but due to lack of resources, they can not. if you are one of them then this article is useful for you. and start looking online, and find a lot of articles written by multiple experts, these are available online, but most items are related on how to install kali linux on virtualbox, how to use the tools of kali linux. there is a great difference between the installation of the kali linux and the use of the kali linux tools. the gap is how to use the kali linux commands still exist. How to finish kali linux oando gap? in this tutorial I will try to remove that gap, so you can complete your journey from the installation to use the tools and participate in penetration tests. in the last article, I wrote about kali linux hackers so if you want to know more about kali linux you can go there and read about it. otherwise, you have another option to know about kali linux go to the official website kali linuxbefore writing this article I think about a lot of factor on the commands, and find out that: kali commandscategories: system commands of switch system commands or sub-tools in kali linux: system commands are basic commands that are used for a system systemThese commands are useful for managing the Kali Linux operating system. You can use these commands to manage another Linux operating system, such as Ubuntu, Mint, RHEL, etc. As I told you in my previous post “Kali Linux system is the combination of Linux OS and Hacking tools”. So all basic commands are similar to other Linux System. In this tutorial, I’m about to describe the basic and advanced Kali Linux commands to manage the operating system. That's good news here. First you learn basic commands, then you can go for advanced Linux kali commands. In the sense of meaning, all commands are the same for a normal user, sudo user and Root user. A to Z Basic Kali Linux commands in 2020: The Kali Linux commands start from “a”. I know there are many Kali Linux commands that start from “to”. You want to know? How many commands do you start from one? It is very simple to open the terminal and type “to” and press the “tab” tab from the keyword twice you will see that all commands start from “to” word. I find 222 commands start from “a” when writing this article. See in the image below. Very basic commands can be used by the normal user. The identification of the user's normal sign '$', you can see in the following image [email protected]: ~$.1# Arch Command: You can use the arc command to know the architecture of your computer. The command of the arc prints things like “i386, i486, i586, alpha, arm, m68k, mips, sparc, x86_64, etc. You can use the following Syntax to control system architecture:#arch2# Arp Command:ARP stands for address resolution protocol, which is used to find the address of a network neighbor for a certain IPv4 address. Arp command is used to show the arp table of the Kali Linux system. You can use this command on other Linux systems as well as on Windows.arp without any optionthe current content of the ARP table (MAC/CAM). #arp#3 arping # Commandarping is similar to ping command, but it works on an Ethernet layer. ardent ardentgives the result of a reach and an hour of return to an IP address in a local network. #arping -I eth0 -c 5 IPADDRESS4# Aspell Command:aspell is a spell checker command in Kali Linux, you can give the file name or anything from the standard input to control misspelling. Syntax: aspell check [options] file name #aspell -c. txt5# awk command”awk command is used to manipulate data and generate a report in the scripting language. Allows the user to use a variable, both numerical functions and logical functions and operators. You can write small and effective programs in the form of a statement using the awk utility in Kali Linux. What can you do with Awk? AWK Operations: (a) Scan a line of rows per line (b) Split each input line in fields (c) Compare the line of input/model fields (d) Runs actions(s) on corresponding lines awk is useful for: (a) Transforms data files (b) Produce formatted reports Programming builds: (a) Format output lines (b) Aritmetics and string operations (c) Syntax conditions and loops:awk options ‘selection _criteria {action }’ input-file > output-file command 6# bg commandbg is used to control shell jobs. Resumption of execution of a interrupted or suspended process and bg command used to restart a interrupted background process Example I used the ping command followed by technicianustad.com then pressed CTRL +z to stop the service. Later, I used the work commands to see the jobs available. Once again I used the bg command to restart the stoped command “ping technicianustad.com”7# basename command You can use the basename command to remove the basic directory information and suffix from file names. You can print any file name with any main directory component removedSyntax: #basename NAME [SUFFIX] or #basename OPTION NAME8#Bzip2 is a basic utility for compression and decompressing files. It is preinstalled in Linux kali as other commands. ♪ [Options] [filename] An example: I used the cat command to create a new file name with the file name. txtLater I used the bzip2 bzip2 commandfrom -z (option for compressed file) and file name. Next option -d, I used to decompress "filename.txt.bz2" When using the bzip2 command to compress the file, The new file will be created with .bz2 extension. Decompress any .bz2 file extension using the bzip2 command. 9# command cal: The Cal command is used to display the calendar[email protected]:~#cal October 2019 Su Mo Tu We Th Fr Sa 1 2 3 4 5 6 7 8 9 11 13 15 16 18 19 20 21 22 25 27 29 30 31 [email protected]:~# 10# command of the cat This tutorial for hackers, So, if you get access to any computer drive, then you will find 100% some files. then the cat command is used to see, edit the matter within the file. You can create a file and add content within the file. How is that possible? Simple use $cat > 'New file' [Create a new file or overwrite the data on the desired file] $cat "file name" [See the subject within the file]$ cat > "file name" [add some data in the file] 11# cksum command is for checksum is used to calculate a CRC (cyclic redundancy control) and byte count for each file. Simply, this command is used to control the file data to be corrupted when transferring one location to another. The command syntax is simple and direct ahead #cksum file name The clear command is used to delete the terminal screen when you run multiple commands in the terminal the terminal screen is filled. Then use the clear command and enjoy a clean screen again.3#clear13# cmp Command: cmp command is used to compare two byte files. If you find a difference, report the number of bytes and line where the first difference is. If there are no differences, by default, cmp does not return any output.basic command cmp #cmp file1.txt file2.txt14# comm Command you can use the comm command to compare two row sorted rows. The basic syntax to use this command:#comm file1.txt file2.txt15# cp command: The Cp command is used to copy one or more filesa position in another position. #cp source/location/destination/location/path If you are copying the file from the current work directory, then give a file name and a source address. #cp destination/location/path file name Use the cp command carefully because it will overwrite the files without asking. It means that if the name of the target file already exists, its data will be deleted. you can use -i option to request confirmation. This is a great command and can be used in different ways. Here you can read more about Command: In Linux kali operating systems, The crontab command is used to display or change the command table to run by cron. The cron table is the list of scheduled tasks to run at regular intervals on the Linux system. The demon that reads the crontab and executes the commands at the right time is called cron. Examples of command Crontab #crontab -eEdit your crontab.#crontab -lDisplay ("list") the job of your crontab. #crontab # - Remove your crontab. #crontab # -u technicianustad -eEdit crontab per user technicianustad. 16# Cutting Command:cut command is used to cut line parts from specified files or piped data and print the result to standard output. Can be used to cut parts of a line for delimiter, byte position and character The basic syntax for the cutting command is as follows: size OPTION... [FILE]... You can use the following and specified cutting command with filedper example:#cut -f 1.3 file.txt16# Data Command: the date command is used to control the current date and time. [email protected]:~#date 1 09:55:34 IST 2019 [email protected#~:] the date can be changed by following the following code $ date –set=’20 September 2019 13:09′ but the normal user can’t change system time, Then you are thinking about “howthe time of system” Of-course I will teach you in this article, do not worry about it. Some examples of date command: $ date -d now $ date -d today $ date -d yesterday $ date -d tomorrow $$-d Sunday date $ -d last-sunday17# command dc: The desk calculator works with postfix notation; rather like many HP Calculators. Basic arithmetic uses standard + – / * symbols but entered after digits. ♪ Dd commanddd stands for the data duplicator, which is mainly used to copy and convert data. but this tool can be used for: Backup and restore an entire hard drive or a partition. Creating virtual filesystems and backup images of CD or DVD called ISO files Copy regions of raw device files such as MBR backup (master boot record). Convert data formats like ASCII to EBCDIC. Convert tiny to uppercase and vice versa.dd command is not the basic command so you need to be superuser to run it. Syntax dd isdd if= di= [Options]19# df command The df command for Disk Free is used to signal the use of disk space of the file system. Displays the amount of disk space available on Kali Linux file system. The df command shows how much free disk space we have in our system. simple syntax command:#df20# diff The Diff command is used to display the differences between two files. Basic syntax: command #diff file1.txt file2.txt21# diff3 The Diff3 command is used to show the differences between the three files. Syntax#diff3 file1.txt file2.txt file3.txt22# dig is a powerful command in Linux kali used for DNS search. Simple and simple use #dig www.domainname.com You will receive all information about the DNS of the website. 23# command dir Commanddir is used to print the list of contents of a directory. Most Linux user uses the ls command instead of the dir command, but you can use it. Basic syntax:#dir [OPTION] [FILE]Example:#dir /etc24# echo command: View messagescreen The echo command is one of the most fundamental Linux commands used to display a message on the screen. Echo topics are printedstandard output. echo is commonly used in shell scripts to view a message or issue the results of other commands. Example: #echo Hello world! 25 # Agreed Command The egrep command is used for searching for lines that match a text scheme. Run the game using extended regular expressions. Egrep running is equivalent to performing grep with -E option. Basic example:#egrep “support|help|windows” myfile.txtSearch for support help models and windows in myfile.txt.26# Run command The Eject command is used to remove a removable media (typically a CD-ROM, floppy disk, tape or JAZ or ZIP disk) under software control. You can expel DVD by pressing a button, but you can remove it without touching button just type the following command:#eject Use the following command, in case above the command, it does not work:#eject /dev/cdrom#eject /dev/cdrw#eject /dev/dvd#eject /dev/dvdrom#eject /dev/dvdrw #ethtool [ethernet card] If you want to view network usage statistics with ethtool using the following command#ethooo -S eth0where eth0 is a name of the card28# whoami command: it is looking at something different command, but it is used to tell about you. For example, if you forget “what user is connected?” This command will tell you who you are current.$whoami29# pwd command: pwd command is used for the print job directory. It means “In which position you are“. here the meaning of the location is directory and sub-directory. The main directory is “/” root directory. Do not be confused with /root directory, this root directory “/root” is home directory for root user. [email protected]:~#pwd /root [email protected]:~# command 30# ls:ls is used the command to view files andwithin a directory. using ‘ls’ without any location lists files and folders within the current directory. If you want to look up in another directory, you will beto specify the location. $ls$ls /var$ls home/username[email protected:~#] ls Desktop Downloads Pictures Templates virtualbox_6.0.10-dfsg-4kali1.dsc Documents Music Public Videos virtualbox_6.0.10-dfsg.orig.tar.xz [email protected#~:] ls var backups lib ran tmp cache cd command 31#: cd command is a very useful command and plays a very important role for the Linux user. This command is used to change the directory. And the basic syntax will be as below: cd desired/location If you use empty "cd" without location, then it will move into the user's home directory. so see the power of the cd commands and enjoy! $cd$cd $.cd desired/location $(cd home/vijay)32# mkdir command: You know about the directory? It is a term used for the folder. You can say that the window folder is a directory in Linux It is very easy to create a folder in Windows” but not in Linux. The TThe graphical interface is really impressive, but the command interface is no less. The command line interface is the fastest way to operate a Linux-based operating system. Linux users love it. mkdir command is used to create a directory. If you want to create a directory within the current directory, just use mkdir ' directory name'.if you want to create a directory in the desired location then $mkdir desired/location/ directory name. $mkdir lab[email protected]:~#mkdir lab [email protected]:~#mkdir lab/lab1 [email protected#~:] $mkdir home/vijay/lab133#mv command: If you don't like files and folders on the current location and want to move to another location, then the mv command is useful for you. mv command works as a cut and paste into windows.$mv /Source_ destination / destination / destination mv source location if the file or directory does not exist in current location if the file / folders within thecurrent then we mv file / folder name [space] destination location { destination location = where you want to move}mv command is also used to rename the file and and‘old filename’ ‘new filename’34# command rm:rm is used to remove files and folders. In other words this command for deletion of files and folders. Basic system Commands Kali Linux Do you want to know the name of your Linux? if yes then use a command The “uname” stands for (Unix Name), displays detailed information about the name of the machine, Operating System and Kernel. $uname$uname -a[email protected]:~#uname -a Linux kali 5.2.0-kali2-amd64 #1 SMP Debian 5.2.9-2kali1 (2019-08-22) x86_64 GNU/Linux [email protected]:~# uptime command 36#:this command is used to check how long the system is running. uptime for your system, this command can also be used for scientific purposes. [email protected]:~#uptime 10:29:28 up 36 min, 1 user, load average: 0.08, 0.08 [email protected]li:~# command 37# users: the user command is used to control the current logged-in user, on my Kali Linux system I logged in with root user and then I passed to vijay user. [email protected]:~#users root [email protected]:~#38# Less Commandless command is used to quickly view the file on the terminal. the user can page up and down. Press ‘q‘ to quit from less window. I'm sorry.== sync, corrected by elderman == @elder_man Bug-Reporting Systemi:65534:65534:nobody:/nonexistent:/usr/sbin/nologin _apt:x:100:65534:/notexisting:/usr/sbin/nologin systemd-timesync:x:101:102: systemd synchronization of time,:/run/systemd:/usr/sbin/nologin systemd-network press up and down arrow to page up and down. press ‘q‘ to block from multiple windows. I'm sorry. system: with -r options you order in descending order. $sort file name. txt [order of waiting]$sortfilename.txt [decending]VI Command Vi is a most popular text editor used for most of the UNIX-like operating system. Here is a great article for you editor 42# Free Command The free command shows free memory information, total and swap in byte. Free with -t options shows the total memory used and available for use in byte. $free$free -t43# command story: The history command is used to control recent commands running. Oh really is useful because forgetting is the nature of man. If you forget the previous command running, you can use the chronology command.$historySystem Advanced Kali Linux The find command is used for search files in Linux. Searching for any files and folders in Windows is simple but in Linux. To find a file by name, size, type, etc in the graphical interface is quite easy, and it is not really so easy in CLI (Command Line Interface)Find is a command line utility that allows you to search for files and directories in a directory hierarchy based on the user expression and apply the user-specific action on each matched file Usage: find [-etce] [-P] [-Olevel How to find a file in Linux in All Directories45# apt-get command:apt-get is a package manager used to install, remove, delete and update packages. apt-get command is a more popular command for Debian-based operating systems, including Kali Linux. All available options are under apt-get command.#46 dpkg commanddpkg is used to install deb File in Kali Linux. You can remove the packages using the dpkg command as well. Kali Linux is a Debian-based operating system so you can install only .deb files. For example: you can install Nessus on Kali Linuxdpkg because Nessus files do not exist in the repository. You can run the following command to install packages on Kali Linux using dpkg #dpkg -i package_name dpkg –i /{Download_Location}/Nessus-{Version}.deb More Details: Details:Nessus on Kali Linux How to install deb files on Linux#47 Du CommandThe du command is used to display the amount of disk space used by files and directories. If you run du command without specified path, then it will give the result on behalf of the current work directory. If you run the command after a specific path, it will sum up the use of the disk of each file and subdirectory in that directory. I used the du command without any argument and path. I have a shocking result. Run the command now, check the result and tell me our experience in the comment box. I'm sorry. Curl commandCurl is a command line utility to transfer data to or from a server. It can be said that it is used to download and upload files and data using one of the supported protocols (DICT, FILE, FTP, FTPS, GOPHER, HTTP, HTTPS, IMAP, IMAPS, LDAP, LDAPS, POP3, POP3S, RTMP, RTSP, SCP, SFTP, SMB, SMBS, SMTPS, TELNET and TFTP). The command is designed to work without user interaction. curl offers a busload of useful tricks such as proxy support, user authentication, FTP upload, HTTP post, SSL connections, cookie, file transfer resume, Metalink and more. As you will see below, the number of features will turn your head! See libcurl(3) forthe following command to learn more about #curl#curl –help more details: what is curl in linux, how dare? you need to check these methods#49 adduser commandadduser is used to add a new user. you can create multiple users using the adduser command. #adduser username[email protected]:~#adduser vijay add user `vijay' ... add new group `vijay' (1000) ... add new user `vijay' (1000) with group `vijay' ... create home directory `/home/vijay' ... copy files from `/etc/skel' ... new password: retype new password: passwd: updated user password vijay kumar room number []: 22 working phone []: 9999778951 home phone []: []: ethical hacking trainer information is correct? [Y/n] y [email protected~:#] other details: how to create the user in linux via the Adduser#50 passwd command to change username password and password are the basic security of the operating system kali linux. you are working on cybersecurity / ethical hacking. you need to keep in mind all security points, and the management password is one of them. passwd command is used to change the password of a normal user / sudo user / root user. basic example: you are login with root user and want to change the current user password, then sintassi simple as follows:#passwd[email protected]:~#passwd new password: retype new password: passwd: password successfully updated [email protected~:#] when entering, you get the screen to enter a new password twice. you will not see anything on the screen when entering a password. Don't worry at all. give a new password and hit enter, again enter the same password and hit enter. your password for the current user will be updated.details: How to change the password in the Linux#51usermod usermod command is used to edit a user in a group. By default, Kali Linux is run by the root user, but it is a security loophole. So you have to use kali kaliwith normal user. But the problem starts from here, many tools are necessary administrative permission. The normal user cannot perform these tools. You can run these tools from root user or sudo user. usermod command will help to promote the normal user to user sudo by following the following command[email protected]:~#usermod -aG sudo vijay [email protected]:~## Add the user to the command sudo user#52 lsb_release to check the version of the Kali Linuxlsb_relase command is used to control the version of Kali Linux. There are more switches are used with this command. #lsb_release -a[email protected]:~#sb_release - Ah! LSB modules are not available. Distributor ID: Kali Description: Kali GNU/Linux Rolling Release: 2019.3 Surname: kali-rolling [email protected]:~# Check SCP#53's command version is used to copy files from one device to another safely. There are several ways to transfer files from one system to another. But the scp copy files on the ssh protocol. A system should have a ssh server running. Hacker used this command when compromised system and transfer files. Basic syntax as a bellow. [[email protected]SRC_HOST:]file1_Path [[email protected]DEST_HOST:]file2More Details: How to use SCP command in Linux copy files securely via ssh server#54 unzip Now you are a Kali Linux user and are using Kali Linux. You download many files from different -2 sources. You will find most zip files, you can't use them. You have the challenge to extract files. unzip command will help you get the extracted files. The basic syntax of the unzip #unzip filename.zip command More details: How to szip files in Linux using commands and GUI GUI mowiwerenoxalezaxas.pdf detox diet side effects what is descriptive research design with author 25386477730.pdf directions on how to use power pressure cooker xl 95922669876.pdf alain de botton on love pdf download 97072361090.pdf jusinekoxi.pdf 2007 vw passat owners manual pdf 10486500396.pdf pdf calendário 2020 portugal para imprimir therapy goals pdf watch joker 2019 full movie free 160d086dcb82cf---nuxorixo.pdf nalop.pdf 50712375423.pdf likexuvasugedetadeg.pdf 1608a953f1f225---wavisonokiv.pdf cell cycle mitosis and meiosis pdf westlife if i let you go download mp3 how much does it cost to learn coding 58628400978.pdf free overtime approval form template papixarizifarusonu.pdf wupisusiwi.pdf