Useful Links
Computer Science
Operating Systems
Linux
Kali Linux
1. Introduction to Kali Linux
2. Getting Started with Kali Linux
3. Linux Fundamentals for Kali Users
4. The Penetration Testing Methodology
5. The Kali Linux Toolkit: Information Gathering
6. The Kali Linux Toolkit: Vulnerability Analysis
7. The Kali Linux Toolkit: Web Application Analysis
8. The Kali Linux Toolkit: Database Assessment
9. The Kali Linux Toolkit: Password Attacks
10. The Kali Linux Toolkit: Wireless Attacks
11. The Kali Linux Toolkit: Reverse Engineering
12. The Kali Linux Toolkit: Exploitation Tools
13. The Kali Linux Toolkit: Sniffing and Spoofing
14. The Kali Linux Toolkit: Post-Exploitation
15. The Kali Linux Toolkit: Forensics
16. The Kali Linux Toolkit: Reporting Tools
17. Advanced Kali Linux Usage
18. System Maintenance and Security
Linux Fundamentals for Kali Users
Understanding the Linux System
Linux Architecture Overview
Kernel and User Space
File System Hierarchy
Root Directory Structure
Important System Directories
User Directories
Linux Boot Process
BIOS/UEFI
Boot Loader
Kernel Loading
Init System
The Command Line Interface
Terminal Emulators in Kali
Default Terminal
Alternative Terminals
Terminal Customization
Shell Basics
Bash Shell Features
Command History
Tab Completion
Command Aliases
Navigating the Filesystem
pwd
cd
ls
Basic Usage
Common Options
Long Listing Format
File and Directory Management
Creating Directories
mkdir
mkdir with Options
Removing Directories
rmdir
rm -r
File Operations
touch
cp
Basic Copy Operations
Recursive Copying
Preserving Attributes
mv
Moving Files
Renaming Files
rm
Safe Deletion Practices
Force Deletion
Viewing and Editing Files
File Content Viewing
cat
less
more
head
tail
Following Log Files
Text Editors
nano
Basic Usage
Keyboard Shortcuts
vim
Modes of Operation
Basic Commands
Configuration
emacs
Finding Files and Directories
find
Basic Search Syntax
Search by Name
Search by Type
Search by Size
Search by Time
Executing Commands on Results
locate
Database Updates
Basic Usage
grep
Pattern Matching
Regular Expressions
Recursive Searching
Input/Output Redirection
Standard Streams
Output Redirection
Input Redirection
Pipes
Command Chaining
User and Privilege Management
Understanding Users and Groups
User Types
Group Concepts
User and Group Files
/etc/passwd
/etc/shadow
/etc/group
The Root User and sudo
Default User Policy in Kali
Using sudo Privileges
sudo Configuration
su Command
Managing Users and Groups
User Management
useradd
usermod
userdel
passwd
Group Management
groupadd
groupmod
groupdel
groups
id Command
Understanding File Permissions
Permission Types
Read Permission
Write Permission
Execute Permission
Permission Representation
Symbolic Notation
Octal Notation
Changing Permissions
chmod
Symbolic Mode
Numeric Mode
chown
chgrp
Special Permissions
Setuid
Setgid
Sticky Bit
Default Permissions
umask
System and Process Management
System Information
Hardware Information
uname
lscpu
lshw
lsusb
lspci
Memory and Storage
free
df
du
fdisk
System Monitoring
uptime
who
w
Process Management
Understanding Processes
Process Types
Process States
Process Hierarchy
Viewing Processes
ps
Basic Usage
Common Options
Process Trees
top
Interactive Usage
Sorting Options
htop
Enhanced Features
Configuration
Process Control
Job Control
Background Jobs
Foreground Jobs
Process Termination
kill
killall
pkill
Process Priority
nice
renice
Service Management
systemd Overview
systemctl
Starting Services
Stopping Services
Restarting Services
Service Status
Enabling Services
Disabling Services
Legacy service Command
Service Configuration Files
Networking Essentials
Network Configuration
Network Interfaces
Physical Interfaces
Virtual Interfaces
Configuration Tools
ifconfig
Interface Status
IP Configuration
Interface Control
ip Command
Modern Network Configuration
Route Management
Address Management
iwconfig
Wireless Configuration
Wireless Status
Network Testing
Connectivity Testing
ping
Basic Connectivity
Continuous Ping
Packet Size Options
traceroute
Path Discovery
Troubleshooting Routing
mtr
Combined Ping and Traceroute
DNS Operations
DNS Resolution Tools
nslookup
Interactive Mode
Non-interactive Mode
dig
Query Types
Reverse Lookups
Trace Options
DNS Configuration
/etc/resolv.conf
systemd-resolved
Network Monitoring
Connection Monitoring
netstat
Active Connections
Listening Ports
Routing Tables
ss
Socket Statistics
Filtering Options
lsof
Network Files
Process Network Usage
Package Management with APT
APT Basics
Package Management Concepts
Repository System
Package Dependencies
Repository Management
sources.list Configuration
Adding Repositories
Removing Repositories
Repository Keys
Package Operations
Updating Package Lists
apt update
Upgrading Packages
apt upgrade
apt full-upgrade
apt dist-upgrade
Package Search
apt search
apt-cache search
Package Information
apt show
apt-cache show
Installing Packages
apt install
Installation Options
Dependency Handling
Removing Packages
apt remove
apt purge
apt autoremove
Advanced APT Usage
Package Pinning
Holding Packages
Local Package Installation
Package Building
Previous
2. Getting Started with Kali Linux
Go to top
Next
4. The Penetration Testing Methodology