title
Linux for Ethical Hackers (Kali Linux Tutorial)
description
In this course, you will learn the basics of Kali Linux. The course covers installation, using the terminal / command line, bash scripting, tools and features for ethical hacking, and more. The course focuses on Kali Linux but much of the content applies to other versions of Linux as well.
⭐️ Course Contents ⭐️
⌨️ Installing VMWare / Kali Linux
⌨️ Kali Linux Overview
⌨️ Navigating the File System
⌨️ Users and Privileges
⌨️ Common Network Commands
⌨️ Viewing, Creating, and Editing Files
⌨️ Starting and Stopping Services
⌨️ Installing and Updating Tools
⌨️ Scripting with Bash
🎥 Course created by The Cyber Mentor. Check out his YouTube channel: https://www.youtube.com/channel/UC0ArlFuFYMpEewyRBzdLHiw
🐦 The Cyber Mentor on Twitter: https://twitter.com/thecybermentor
--
Learn to code for free and get a developer job: https://www.freecodecamp.org
Read hundreds of articles on programming: https://www.freecodecamp.org/news
https://www.youtube.com/watch?v=coQ5dg8wM2o
detail
{'title': 'Linux for Ethical Hackers (Kali Linux Tutorial)', 'heatmap': [{'end': 4866.737, 'start': 4790.632, 'weight': 1}, {'end': 6468.524, 'start': 6386.419, 'weight': 0.98}, {'end': 6680.345, 'start': 6601.762, 'weight': 0.824}, {'end': 7253.565, 'start': 7181.532, 'weight': 0.795}], 'summary': "Tutorial 'linux for ethical hackers (kali linux tutorial)' by heath adams provides hands-on training on kali linux, covering essential tools, networking, file system basics, secure passwords, network commands, terminal usage, ip address scripting, nmap scanning, and penetration testing certifications.", 'chapters': [{'end': 93.477, 'segs': [{'end': 93.477, 'src': 'embed', 'start': 18.884, 'weight': 0, 'content': [{'end': 22.565, 'text': "especially if you're interested in becoming an ethical hacker or a penetration tester.", 'start': 18.884, 'duration': 3.681}, {'end': 24.346, 'text': 'So enough of my face.', 'start': 23.066, 'duration': 1.28}, {'end': 26.227, 'text': "Let's go ahead and just dive right in.", 'start': 24.646, 'duration': 1.581}, {'end': 28.107, 'text': 'All right, everyone.', 'start': 27.406, 'duration': 0.701}, {'end': 31.269, 'text': 'Welcome to this course titled Linux for Ethical Hackers.', 'start': 28.147, 'duration': 3.122}, {'end': 36.792, 'text': "Before we get started, I'd like to do a little Who Am I? So my name is Heath Adams.", 'start': 31.949, 'duration': 4.843}, {'end': 39.774, 'text': 'I also go by the Cyber Mentor.', 'start': 37.613, 'duration': 2.161}, {'end': 47.62, 'text': 'I am a husband first, a hacker, a military veteran, a gamer, sports fan, and animal dad.', 'start': 40.575, 'duration': 7.045}, {'end': 54.043, 'text': "I am a former accountant turned security geek, so I've been in cybersecurity about three years now.", 'start': 48.64, 'duration': 5.403}, {'end': 60.646, 'text': 'And before that, I was an accountant, hated it, picked that field for all the wrong reasons.', 'start': 54.943, 'duration': 5.703}, {'end': 66.249, 'text': "So once I went into IT and cybersecurity, I never looked back and I've never been happier.", 'start': 61.446, 'duration': 4.803}, {'end': 70.106, 'text': 'On the day to day, I am a senior security engineer.', 'start': 67.105, 'duration': 3.001}, {'end': 73.368, 'text': "I'm also a business owner at TCM Security.", 'start': 70.607, 'duration': 2.761}, {'end': 79.511, 'text': 'So before that I was a senior penetration tester doing penetration testing and ethical hacking.', 'start': 73.928, 'duration': 5.583}, {'end': 86.134, 'text': 'I branched out and started my own business focusing on ethical hacking training and student development.', 'start': 79.971, 'duration': 6.163}, {'end': 93.477, 'text': "So now I'm doing that full time along with a job as a senior security engineer.", 'start': 87.274, 'duration': 6.203}], 'summary': 'Heath adams, a cybersecurity expert, transitioned from accounting to ethical hacking, now a senior security engineer and business owner at tcm security.', 'duration': 74.593, 'max_score': 18.884, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/lZAoFs75_cs/pics/lZAoFs75_cs18884.jpg'}], 'start': 0.356, 'title': 'Linux for ethical hackers', 'summary': "Introduces the course 'linux for ethical hackers' by heath adams, emphasizing terminal and command line usage and the instructor's background in ethical hacking and cybersecurity.", 'chapters': [{'end': 93.477, 'start': 0.356, 'title': 'Linux for ethical hackers', 'summary': "Introduces the course 'linux for ethical hackers' by heath adams, covering terminal and command line usage, and emphasizes the instructor's background in ethical hacking and cybersecurity.", 'duration': 93.121, 'highlights': ["Heath Adams introduces the course 'Linux for Ethical Hackers' and emphasizes its relevance for those interested in ethical hacking or penetration testing.", 'Heath Adams shares his transition from being an accountant to a cybersecurity professional, highlighting his experience of about three years in the field.', 'Heath Adams describes his current roles as a senior security engineer and a business owner at TCM Security, focusing on ethical hacking training and student development.']}], 'duration': 93.121, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/lZAoFs75_cs/pics/lZAoFs75_cs356.jpg', 'highlights': ["Heath Adams introduces 'Linux for Ethical Hackers' course, relevant for ethical hacking or penetration testing.", 'Heath Adams has about three years of experience in cybersecurity after transitioning from accounting.', 'Heath Adams is a senior security engineer and business owner at TCM Security, specializing in ethical hacking training.']}, {'end': 1074.461, 'segs': [{'end': 159.524, 'src': 'embed', 'start': 117.882, 'weight': 0, 'content': [{'end': 127.15, 'text': "We're going to be focusing on Kali Linux this entire course and really learning Linux and learning Linux for the purpose of becoming ethical hackers.", 'start': 117.882, 'duration': 9.268}, {'end': 136.018, 'text': "So we're going to install VMware, which is a virtualized software, virtualization software, and then we're going to run Kali Linux inside of VMware.", 'start': 127.711, 'duration': 8.307}, {'end': 142.866, 'text': "After that, I'm going to give you a overview of Kali Linux, show you some of the common tools, what it can do, why it's awesome.", 'start': 136.678, 'duration': 6.188}, {'end': 146.851, 'text': "And then we're going to do a deep dive into the terminal.", 'start': 143.587, 'duration': 3.264}, {'end': 152.758, 'text': "So what that means is we're going to be hands on doing commands and learning Linux.", 'start': 147.271, 'duration': 5.487}, {'end': 159.524, 'text': "So we'll be running navigating the file system, so how to get around in the file system from the terminal.", 'start': 153.599, 'duration': 5.925}], 'summary': 'Focused on kali linux, installing vmware, learning linux for ethical hacking, and deep dive into terminal.', 'duration': 41.642, 'max_score': 117.882, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/lZAoFs75_cs/pics/lZAoFs75_cs117882.jpg'}, {'end': 545.946, 'src': 'embed', 'start': 515.342, 'weight': 3, 'content': [{'end': 522.365, 'text': 'If we wanted the Pro Edition, we would enter in our access key here, our license key, and continue on with the Pro Edition.', 'start': 515.342, 'duration': 7.023}, {'end': 530.15, 'text': 'And now we will use the Finish button here, and we will be brought to our VMware Workstation 15 Player.', 'start': 524.126, 'duration': 6.024}, {'end': 535.373, 'text': "So you can see here that it's a much, much different view.", 'start': 531.809, 'duration': 3.564}, {'end': 536.775, 'text': "It's very, very basic.", 'start': 535.493, 'duration': 1.282}, {'end': 545.946, 'text': "We have the option to open a VM here, and we'll have the one VM stored in this tab that we can open up, and that'll be it.", 'start': 537.596, 'duration': 8.35}], 'summary': 'Using the pro edition requires entering an access key and license key, providing a different and basic view with the option to open a single stored vm.', 'duration': 30.604, 'max_score': 515.342, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/lZAoFs75_cs/pics/lZAoFs75_cs515342.jpg'}, {'end': 653.731, 'src': 'embed', 'start': 621.804, 'weight': 4, 'content': [{'end': 622.744, 'text': 'and leave it here.', 'start': 621.804, 'duration': 0.94}, {'end': 628.865, 'text': "What we're going to do as well is I want to talk just a quick second about what Kali Linux is.", 'start': 623.424, 'duration': 5.441}, {'end': 634.426, 'text': 'So Kali Linux is a Debian based Linux OS.', 'start': 629.685, 'duration': 4.741}, {'end': 642.448, 'text': "So it's based on pen testing tools and it's made for pen testers.", 'start': 635.066, 'duration': 7.382}, {'end': 648.769, 'text': "So what it does is it comes preloaded with a bunch of penetration testing tools, a toolkit if you'll call it.", 'start': 642.508, 'duration': 6.261}, {'end': 653.731, 'text': 'And it is just made for people who are looking to do pen testing.', 'start': 649.629, 'duration': 4.102}], 'summary': 'Kali linux is a debian-based os with preloaded pen testing tools, tailored for pen testers.', 'duration': 31.927, 'max_score': 621.804, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/lZAoFs75_cs/pics/lZAoFs75_cs621804.jpg'}, {'end': 848.095, 'src': 'embed', 'start': 807.012, 'weight': 5, 'content': [{'end': 808.873, 'text': "Make sure that's the one you're following along with.", 'start': 807.012, 'duration': 1.861}, {'end': 816.808, 'text': "And if you scroll down just a bit, you see that they're providing us VMware images and VirtualBox images.", 'start': 810.205, 'duration': 6.603}, {'end': 819.269, 'text': 'So remember when I told you that VirtualBox was an option?', 'start': 816.828, 'duration': 2.441}, {'end': 822.771, 'text': 'If you chose that option here, you go right here.', 'start': 819.89, 'duration': 2.881}, {'end': 825.893, 'text': "you'll click on this tab and you will download the VirtualBox image.", 'start': 822.771, 'duration': 3.122}, {'end': 835.105, 'text': "Now, what we're going to be doing is we're going to be running Kali Linux VMware 64-bit, and we're going to download this 7-zip right here.", 'start': 826.778, 'duration': 8.327}, {'end': 839.048, 'text': "You also have the option to download a torrent if you'd like.", 'start': 835.605, 'duration': 3.443}, {'end': 844.852, 'text': 'The file size is going to be 2.4 gigs, so it might take you a minute depending on your.', 'start': 839.608, 'duration': 5.244}, {'end': 848.095, 'text': 'speed of your internet.', 'start': 847.034, 'duration': 1.061}], 'summary': 'The transcript covers downloading vmware and virtualbox images for kali linux, with a file size of 2.4 gb.', 'duration': 41.083, 'max_score': 807.012, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/lZAoFs75_cs/pics/lZAoFs75_cs807012.jpg'}, {'end': 985.854, 'src': 'embed', 'start': 960.32, 'weight': 6, 'content': [{'end': 965.203, 'text': "So make sure that you have file space where you're going to put this.", 'start': 960.32, 'duration': 4.883}, {'end': 968.685, 'text': "So I'm going to go ahead and let this finish and then I will be right back.", 'start': 965.703, 'duration': 2.982}, {'end': 972.047, 'text': 'Okay, so I successfully unzipped this file.', 'start': 969.145, 'duration': 2.902}, {'end': 978.13, 'text': 'And just for the record, if we hover over it, you can see that it actually extracted to be 10.4 gigabytes.', 'start': 972.707, 'duration': 5.423}, {'end': 985.854, 'text': "So let's make sure that wherever you extract it to you have the 10.4 gigabytes in order to successfully complete the extraction.", 'start': 978.71, 'duration': 7.144}], 'summary': 'Successfully unzipped a file, which extracted to 10.4 gigabytes.', 'duration': 25.534, 'max_score': 960.32, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/lZAoFs75_cs/pics/lZAoFs75_cs960320.jpg'}, {'end': 1081.727, 'src': 'embed', 'start': 1050.308, 'weight': 7, 'content': [{'end': 1051.248, 'text': "That's fine.", 'start': 1050.308, 'duration': 0.94}, {'end': 1057.791, 'text': 'If you want it to run faster, I recommend going somewhere between 4 and 8.', 'start': 1052.249, 'duration': 5.542}, {'end': 1061.232, 'text': "Obviously, the more RAM you give it, the better it's going to perform.", 'start': 1057.791, 'duration': 3.441}, {'end': 1067.276, 'text': "But if you're running on 8 gigs of RAM for your machine, really not going to do well for you.", 'start': 1062.032, 'duration': 5.244}, {'end': 1070.598, 'text': 'My recommendation is no more than a fourth.', 'start': 1068.037, 'duration': 2.561}, {'end': 1074.461, 'text': "So if you're running on 16, then maybe give this four.", 'start': 1071.199, 'duration': 3.262}, {'end': 1076.423, 'text': 'You could really try pushing it up to eight.', 'start': 1074.541, 'duration': 1.882}, {'end': 1081.727, 'text': 'But I am running on 32 right now, so I could crank this up to eight by my rule here.', 'start': 1077.323, 'duration': 4.404}], 'summary': 'Increase ram to 4-8 for faster performance. 8gb ram may not perform well.', 'duration': 31.419, 'max_score': 1050.308, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/lZAoFs75_cs/pics/lZAoFs75_cs1050308.jpg'}], 'start': 95.051, 'title': 'Kali linux installation and ethical hacking', 'summary': 'Covers a hands-on course focusing on kali linux for ethical hacking, including installing vmware, understanding common tools, learning linux commands, networking, file editing, service management, updates, and scripting in bash. it also covers the installation of vmware workstation 15 player and provides an overview of kali linux, detailing the process of downloading and installing kali linux, including allocating 4-8 gigs of ram for better performance.', 'chapters': [{'end': 442.826, 'start': 95.051, 'title': 'Ethical hacking with kali linux', 'summary': 'Covers a hands-on course focusing on kali linux for ethical hacking, including installing vmware, understanding common tools, learning linux commands, networking, file editing, service management, updates, and scripting in bash.', 'duration': 347.775, 'highlights': ['The course is 95% hands-on and focuses on Kali Linux for ethical hacking.', 'Installing VMware and running Kali Linux inside of VMware is a key part of the course.', 'The course covers a deep dive into the terminal, including Linux commands, file system navigation, user management, and common network commands.']}, {'end': 785.4, 'start': 443.647, 'title': 'Installing vmware workstation & kali linux', 'summary': 'Covers the installation of vmware workstation 15 player for non-commercial use and provides an overview of kali linux, a debian-based os designed for penetration testing, with comparisons to alternative distributions.', 'duration': 341.753, 'highlights': ['The chapter provides a step-by-step demonstration of installing VMware Workstation 15 Player for non-commercial use and showcases its basic interface, highlighting its limited features compared to the Pro Edition.', 'It introduces Kali Linux as a Debian-based OS specifically designed for penetration testing, preloaded with a toolkit of penetration testing tools, and discusses its popularity in the industry compared to alternative distributions like parrot OS.', 'The transcript also mentions the availability of alternatives like parrot OS and the option to set up a custom distribution with specific tools, but emphasizes the dominance of Kali Linux in the industry as the preferred option for learning basic Linux skills and penetration testing.', "The speaker shares their industry experience, noting the widespread usage of Kali Linux among professionals, with some transitioning to parrot OS, but asserts Kali's predominant position in the industry as the best option for learning basic Linux skills."]}, {'end': 1074.461, 'start': 786.18, 'title': 'Kali linux installation process', 'summary': 'Details the process of downloading and installing kali linux, including selecting the correct image, extracting the file, and configuring the virtual machine settings, with a recommendation of allocating 4-8 gigs of ram for better performance.', 'duration': 288.281, 'highlights': ['The installation file size is 2.4 gigs and may vary depending on internet speed.', 'The extracted file size is 10.4 gigabytes, requiring sufficient space for successful extraction.', 'Recommendation to allocate 4-8 gigs of RAM for improved performance when configuring virtual machine settings.', 'Guidance on selecting the correct image, extracting the file, and accessing the virtual machine settings for a seamless setup.', 'Caution against allocating more than a fourth of available RAM to the virtual machine, as it may negatively impact performance.']}], 'duration': 979.41, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/lZAoFs75_cs/pics/lZAoFs75_cs95051.jpg', 'highlights': ['The course is 95% hands-on and focuses on Kali Linux for ethical hacking.', 'Installing VMware and running Kali Linux inside of VMware is a key part of the course.', 'The course covers a deep dive into the terminal, including Linux commands, file system navigation, user management, and common network commands.', 'The chapter provides a step-by-step demonstration of installing VMware Workstation 15 Player for non-commercial use and showcases its basic interface, highlighting its limited features compared to the Pro Edition.', 'It introduces Kali Linux as a Debian-based OS specifically designed for penetration testing, preloaded with a toolkit of penetration testing tools, and discusses its popularity in the industry compared to alternative distributions like parrot OS.', 'The installation file size is 2.4 gigs and may vary depending on internet speed.', 'The extracted file size is 10.4 gigabytes, requiring sufficient space for successful extraction.', 'Recommendation to allocate 4-8 gigs of RAM for improved performance when configuring virtual machine settings.', 'Guidance on selecting the correct image, extracting the file, and accessing the virtual machine settings for a seamless setup.', 'Caution against allocating more than a fourth of available RAM to the virtual machine, as it may negatively impact performance.']}, {'end': 1723.123, 'segs': [{'end': 1271.382, 'src': 'embed', 'start': 1221.921, 'weight': 5, 'content': [{'end': 1226.924, 'text': "OK, so we're at our desktop here inside of Kali Linux.", 'start': 1221.921, 'duration': 5.003}, {'end': 1230.186, 'text': 'Now you see the Kali Linux logo.', 'start': 1227.845, 'duration': 2.341}, {'end': 1232.927, 'text': "you see there's a couple of things on the desktop.", 'start': 1230.186, 'duration': 2.741}, {'end': 1234.048, 'text': "you don't have to worry about these.", 'start': 1232.927, 'duration': 1.121}, {'end': 1237.489, 'text': 'these are just from VMware themselves, put on your desktop.', 'start': 1234.048, 'duration': 3.441}, {'end': 1241.731, 'text': 'if you install this as an actual OS, this will not be here.', 'start': 1237.489, 'duration': 4.242}, {'end': 1246.624, 'text': 'So when we talk about navigating around Kali Linux.', 'start': 1242.331, 'duration': 4.293}, {'end': 1248.325, 'text': "There's a couple of places that we can look.", 'start': 1246.644, 'duration': 1.681}, {'end': 1254.93, 'text': "If we look right away, you can see on the left-hand side over here, we've got a favorites bar.", 'start': 1249.126, 'duration': 5.804}, {'end': 1256.971, 'text': "So we've got our folders.", 'start': 1255.55, 'duration': 1.421}, {'end': 1260.174, 'text': 'So if we click on the folders or our files, we can navigate around.', 'start': 1257.031, 'duration': 3.143}, {'end': 1267.339, 'text': 'This feels like any other machine, right? We have our documents, downloads, music, pictures.', 'start': 1260.294, 'duration': 7.045}, {'end': 1271.382, 'text': "If you're a Windows user or Mac user, whatever, this feels pretty common.", 'start': 1267.419, 'duration': 3.963}], 'summary': 'Introduction to navigating kali linux desktop with common folders and user interface.', 'duration': 49.461, 'max_score': 1221.921, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/lZAoFs75_cs/pics/lZAoFs75_cs1221921.jpg'}, {'end': 1395.863, 'src': 'embed', 'start': 1364.838, 'weight': 2, 'content': [{'end': 1368.521, 'text': 'So again, burp suites a web application penetration testing tool.', 'start': 1364.838, 'duration': 3.683}, {'end': 1373.665, 'text': 'If you ever get into web app, or if you even get into some basic pen testing,', 'start': 1369.021, 'duration': 4.644}, {'end': 1377.388, 'text': "chances are you're going to start using burp suite on a pretty regular basis.", 'start': 1373.665, 'duration': 3.723}, {'end': 1380.133, 'text': 'Over here is ZenMap.', 'start': 1378.772, 'duration': 1.361}, {'end': 1384.836, 'text': 'Now, this is the graphical version of a tool called Nmap.', 'start': 1380.693, 'duration': 4.143}, {'end': 1389.539, 'text': "And you will be using Nmap pretty religiously when you're doing pen testing.", 'start': 1385.737, 'duration': 3.802}, {'end': 1395.863, 'text': 'So if you like a visual view of doing scanning, so Nmap is a network mapper.', 'start': 1389.659, 'duration': 6.204}], 'summary': 'Burp suite and nmap are essential tools for web app penetration testing and network scanning.', 'duration': 31.025, 'max_score': 1364.838, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/lZAoFs75_cs/pics/lZAoFs75_cs1364838.jpg'}, {'end': 1463.176, 'src': 'embed', 'start': 1436.771, 'weight': 1, 'content': [{'end': 1440.453, 'text': "So Metasploit, you may have heard of it if you've heard of anything in pen testing.", 'start': 1436.771, 'duration': 3.682}, {'end': 1444.176, 'text': 'It is a framework that does just a little bit of everything.', 'start': 1441.014, 'duration': 3.162}, {'end': 1447.498, 'text': 'So a lot of pen testers live and die by this.', 'start': 1444.316, 'duration': 3.182}, {'end': 1450.659, 'text': "It's a fantastic tool, in my opinion.", 'start': 1448.598, 'duration': 2.061}, {'end': 1457.904, 'text': "And you're going to get very, very intimate with it very, very quick if you do move into pen testing.", 'start': 1451.56, 'duration': 6.344}, {'end': 1461.455, 'text': 'Down here is a tool called cherry tree.', 'start': 1459.054, 'duration': 2.401}, {'end': 1463.176, 'text': "And that's pretty much where I'm going to stop.", 'start': 1461.495, 'duration': 1.681}], 'summary': 'Metasploit is a versatile tool in pen testing, essential for many testers.', 'duration': 26.405, 'max_score': 1436.771, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/lZAoFs75_cs/pics/lZAoFs75_cs1436771.jpg'}, {'end': 1552.754, 'src': 'embed', 'start': 1528.419, 'weight': 3, 'content': [{'end': 1537.105, 'text': 'But when it comes to pen testing, there are so many tools, so many commands that I think it is incredibly important to be able to take notes,', 'start': 1528.419, 'duration': 8.686}, {'end': 1539.767, 'text': 'and Cherrytree is built in already.', 'start': 1537.105, 'duration': 2.662}, {'end': 1546.491, 'text': 'Personally, I use what used to be in Kali Linux, which is a tool called keep note.', 'start': 1540.687, 'duration': 5.804}, {'end': 1549.973, 'text': 'But cherry tree is a great alternative as well.', 'start': 1547.011, 'duration': 2.962}, {'end': 1552.754, 'text': 'So either of them would work,', 'start': 1550.513, 'duration': 2.241}], 'summary': 'Pen testers emphasize the importance of note-taking, recommending tools like cherrytree or keepnote for the task.', 'duration': 24.335, 'max_score': 1528.419, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/lZAoFs75_cs/pics/lZAoFs75_cs1528419.jpg'}, {'end': 1690.278, 'src': 'embed', 'start': 1659.713, 'weight': 0, 'content': [{'end': 1665.157, 'text': 'Pick a new tool every day, figure out something that you can do with it, how to use it, what it does.', 'start': 1659.713, 'duration': 5.444}, {'end': 1671.161, 'text': 'So Kali Linux is a distribution full of useful tools.', 'start': 1666.398, 'duration': 4.763}, {'end': 1676.345, 'text': "And for a base OS, it's fantastic.", 'start': 1671.922, 'duration': 4.423}, {'end': 1681.809, 'text': "And this is why so many people in the industry just download this, install it, and they're ready to go.", 'start': 1676.786, 'duration': 5.023}, {'end': 1690.278, 'text': 'We talked about in a previous video how there are other OSs or there are people out there that like to just do their base install.', 'start': 1683.29, 'duration': 6.988}], 'summary': 'Kali linux offers a variety of useful tools, attracting many industry professionals for its base os functionality.', 'duration': 30.565, 'max_score': 1659.713, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/lZAoFs75_cs/pics/lZAoFs75_cs1659713.jpg'}], 'start': 1074.541, 'title': 'Kali linux setup and penetration testing tools', 'summary': 'Covers setting up kali linux on vmware, navigating through the graphical user interface and terminal, and introduces essential penetration testing tools such as burp suite, zenmap, metasploit, and cherrytree.', 'chapters': [{'end': 1340.221, 'start': 1074.541, 'title': 'Setting up and navigating kali linux', 'summary': 'Covers setting up kali linux on vmware, logging in, and navigating through the graphical user interface and terminal, preparing for learning tools and features, and command-line operations.', 'duration': 265.68, 'highlights': ['Setting up Kali Linux on VMware', 'Logging in and navigation', 'Future topics and tools of Kali Linux']}, {'end': 1723.123, 'start': 1340.661, 'title': 'Kali linux penetration testing tools', 'summary': 'Introduces the kali linux penetration testing tools, including burp suite, zenmap, metasploit, and cherrytree, emphasizing their importance in pen testing and the need for note-keeping tools.', 'duration': 382.462, 'highlights': ['Kali Linux includes powerful pen testing tools like Burp Suite, ZenMap, Metasploit, and Cherrytree, essential for web application penetration testing and note-keeping.', 'Burp Suite is a popular tool for web application penetration testing, widely used in pen testing and a fundamental tool for pen testers.', 'Metasploit is a versatile framework highly favored by pen testers, offering a wide range of functionalities and considered crucial for pen testing.', 'Cherrytree serves as a valuable note-keeping tool, enabling the organization of notes, commands, and screenshots, making it a crucial asset for pen testers.', 'Kali Linux offers a comprehensive set of tools for information gathering, wireless assessment, and various attacks, providing a wide range of capabilities for pen testers.']}], 'duration': 648.582, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/lZAoFs75_cs/pics/lZAoFs75_cs1074541.jpg', 'highlights': ['Kali Linux offers a comprehensive set of tools for information gathering, wireless assessment, and various attacks, providing a wide range of capabilities for pen testers.', 'Metasploit is a versatile framework highly favored by pen testers, offering a wide range of functionalities and considered crucial for pen testing.', 'Burp Suite is a popular tool for web application penetration testing, widely used in pen testing and a fundamental tool for pen testers.', 'Cherrytree serves as a valuable note-keeping tool, enabling the organization of notes, commands, and screenshots, making it a crucial asset for pen testers.', 'Kali Linux includes powerful pen testing tools like Burp Suite, ZenMap, Metasploit, and Cherrytree, essential for web application penetration testing and note-keeping.', 'Setting up Kali Linux on VMware', 'Logging in and navigation', 'Future topics and tools of Kali Linux']}, {'end': 2477.02, 'segs': [{'end': 1751.779, 'src': 'embed', 'start': 1723.803, 'weight': 0, 'content': [{'end': 1727.245, 'text': 'And you spin that up every time instead of having all these tools built in.', 'start': 1723.803, 'duration': 3.442}, {'end': 1733.569, 'text': "But as a base OS, as something that you can learn from and start with, this is why I've chosen Kali.", 'start': 1727.785, 'duration': 5.784}, {'end': 1735.67, 'text': "And this is why we're going to learn it today.", 'start': 1733.889, 'duration': 1.781}, {'end': 1737.371, 'text': "So let's go ahead.", 'start': 1736.11, 'duration': 1.261}, {'end': 1740.853, 'text': "From here, what we're going to do is we're going to dive right into the terminal.", 'start': 1737.851, 'duration': 3.002}, {'end': 1742.534, 'text': "So let's just open this terminal.", 'start': 1740.873, 'duration': 1.661}, {'end': 1746.776, 'text': "And then we're going to full screen it and move on to the next video.", 'start': 1743.434, 'duration': 3.342}, {'end': 1751.779, 'text': "So from here on out, what we're going to be doing is we're going to be living in this terminal.", 'start': 1746.876, 'duration': 4.903}], 'summary': 'Kali chosen as base os for learning and using terminal extensively.', 'duration': 27.976, 'max_score': 1723.803, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/lZAoFs75_cs/pics/lZAoFs75_cs1723803.jpg'}, {'end': 1829.897, 'src': 'embed', 'start': 1787.38, 'weight': 1, 'content': [{'end': 1790.882, 'text': "So, if you're interested in pen testing, if you're interested in Linux,", 'start': 1787.38, 'duration': 3.502}, {'end': 1795.204, 'text': 'this is where we really get into the meat of the course and it should get interesting for you.', 'start': 1790.882, 'duration': 4.322}, {'end': 1801.967, 'text': "So I will catch you over the next video when we're going to start talking about how to navigate the file system and get comfortable with that.", 'start': 1795.664, 'duration': 6.303}, {'end': 1805.632, 'text': 'All right, on to navigating the file system.', 'start': 1802.992, 'duration': 2.64}, {'end': 1809.293, 'text': "So first, let's talk about some of the commands we're going to learn today.", 'start': 1806.213, 'duration': 3.08}, {'end': 1814.994, 'text': "So we're going to learn about PWD, which is present working directory.", 'start': 1809.313, 'duration': 5.681}, {'end': 1818.875, 'text': "We're going to learn about CD, which is how we change directories.", 'start': 1815.014, 'duration': 3.861}, {'end': 1826.016, 'text': "We're going to learn about LS, which is going to be listing the files in a folder or in a directory.", 'start': 1819.815, 'duration': 6.201}, {'end': 1829.897, 'text': "And we're also going to talk about how to find some hidden folders with LS.", 'start': 1826.156, 'duration': 3.741}], 'summary': 'Introduction to navigating the file system with commands like pwd, cd, ls.', 'duration': 42.517, 'max_score': 1787.38, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/lZAoFs75_cs/pics/lZAoFs75_cs1787380.jpg'}, {'end': 1952.377, 'src': 'embed', 'start': 1898.371, 'weight': 5, 'content': [{'end': 1900.031, 'text': 'Well, in Linux, we can do that.', 'start': 1898.371, 'duration': 1.66}, {'end': 1903.052, 'text': "But the majority of time, we're going to live in this terminal here.", 'start': 1900.411, 'duration': 2.641}, {'end': 1905.352, 'text': 'So we really need to know how to get around.', 'start': 1903.652, 'duration': 1.7}, {'end': 1913.695, 'text': "So the first thing we can do here is we can say, hey, where are we at? And that's PWD.", 'start': 1906.653, 'duration': 7.042}, {'end': 1916.295, 'text': 'So that stands for Present Working Directory.', 'start': 1914.195, 'duration': 2.1}, {'end': 1917.416, 'text': 'So you type that in.', 'start': 1916.616, 'duration': 0.8}, {'end': 1918.176, 'text': 'You hit Enter.', 'start': 1917.596, 'duration': 0.58}, {'end': 1921.558, 'text': "And it says, OK, we're in the root folder.", 'start': 1919.537, 'duration': 2.021}, {'end': 1927.541, 'text': "So we know that we're in the root folder, but how do we get out of the root folder?", 'start': 1922.679, 'duration': 4.862}, {'end': 1932.924, 'text': 'We can use a command called cd, and that stands for change directory.', 'start': 1928.522, 'duration': 4.402}, {'end': 1939.647, 'text': 'So if we want to change directory backwards, we just type in two dots here.', 'start': 1933.584, 'duration': 6.063}, {'end': 1946.311, 'text': "And now we can say, OK, where are we at? So we're in a slash.", 'start': 1940.968, 'duration': 5.343}, {'end': 1952.377, 'text': "So we're just in a home folder here, or just our generic slash folder.", 'start': 1947.293, 'duration': 5.084}], 'summary': 'Linux terminal navigation: pwd for current directory, cd for changing directory, using two dots to move backwards', 'duration': 54.006, 'max_score': 1898.371, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/lZAoFs75_cs/pics/lZAoFs75_cs1898371.jpg'}, {'end': 2006.19, 'src': 'embed', 'start': 1981.816, 'weight': 7, 'content': [{'end': 1989.183, 'text': "And how do we look around? So there's a command called ls that lists everything that's in the folder.", 'start': 1981.816, 'duration': 7.367}, {'end': 1995.086, 'text': 'So if we say LS, we kind of see this color coordinated here.', 'start': 1990.945, 'duration': 4.141}, {'end': 2000.988, 'text': "And the color coordination, it just depends on if it's a folder, if the folders read right.", 'start': 1996.027, 'duration': 4.961}, {'end': 2003.809, 'text': "There's permission settings, which we're going to get into later.", 'start': 2001.008, 'duration': 2.801}, {'end': 2006.19, 'text': 'But the majority of these here are folders.', 'start': 2004.549, 'duration': 1.641}], 'summary': "The 'ls' command lists folders with color coordination. majority of items are folders.", 'duration': 24.374, 'max_score': 1981.816, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/lZAoFs75_cs/pics/lZAoFs75_cs1981816.jpg'}, {'end': 2248.041, 'src': 'embed', 'start': 2223.574, 'weight': 8, 'content': [{'end': 2229.938, 'text': "So what if we want to make our own folder? Well, there's something called make directory, mkdir.", 'start': 2223.574, 'duration': 6.364}, {'end': 2235.501, 'text': "So if we say make directory, and we'll say, I'm just going to use my name, Heath.", 'start': 2230.838, 'duration': 4.663}, {'end': 2241.605, 'text': 'So now if we ls, we can see that this Heath folder is now here.', 'start': 2236.642, 'duration': 4.963}, {'end': 2243.086, 'text': 'We can go into the Heath folder.', 'start': 2241.905, 'duration': 1.181}, {'end': 2248.041, 'text': 'And there should be nothing in it, right? So we can go back.', 'start': 2244.597, 'duration': 3.444}], 'summary': "Using 'mkdir' to create a new folder named 'heath'.", 'duration': 24.467, 'max_score': 2223.574, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/lZAoFs75_cs/pics/lZAoFs75_cs2223574.jpg'}, {'end': 2463.468, 'src': 'embed', 'start': 2436.556, 'weight': 9, 'content': [{'end': 2440.377, 'text': "So we're looking for a file and we're going to get more specific along the way.", 'start': 2436.556, 'duration': 3.821}, {'end': 2445.138, 'text': 'But if you type in locate, you can kind of look through a system to see if you can find it.', 'start': 2440.617, 'duration': 4.521}, {'end': 2451.22, 'text': "Now, I'm looking for, say, any type of bin bash or bin r bash.", 'start': 2446.399, 'duration': 4.821}, {'end': 2451.92, 'text': "That's fine.", 'start': 2451.36, 'duration': 0.56}, {'end': 2452.84, 'text': "That's really what I wanted.", 'start': 2451.96, 'duration': 0.88}, {'end': 2455.681, 'text': 'But it shows you everything with bash in it.', 'start': 2453.441, 'duration': 2.24}, {'end': 2458.742, 'text': 'Now, this might not work right away.', 'start': 2457.041, 'duration': 1.701}, {'end': 2461.687, 'text': 'What you might need to do is update the database.', 'start': 2459.605, 'duration': 2.082}, {'end': 2463.468, 'text': 'So you type in update DB.', 'start': 2461.887, 'duration': 1.581}], 'summary': "Searching for files using 'locate' and updating the database with 'update db'.", 'duration': 26.912, 'max_score': 2436.556, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/lZAoFs75_cs/pics/lZAoFs75_cs2436556.jpg'}], 'start': 1723.803, 'title': 'Kali linux and file system basics', 'summary': 'Introduces kali linux as a base os for learning, emphasizing terminal usage and covering essential commands, preparing learners for pen testing and linux usage. it also covers navigating the linux file system through commands like pwd, cd, ls, mkdir, and locate, providing insights on file navigation, directory creation, and file movement, with tips on hidden folders and file locating.', 'chapters': [{'end': 1854.372, 'start': 1723.803, 'title': 'Introduction to kali linux and terminal basics', 'summary': 'Introduces kali linux as a base os for learning, emphasizing terminal usage and covering essential commands for navigating, managing files, and system operations, preparing learners for pen testing and linux usage.', 'duration': 130.569, 'highlights': ['The chapter emphasizes Kali Linux as a foundational OS for learning, focusing on terminal usage and essential commands, catering to beginners in Linux and pen testing.', 'The instructor highlights the importance of terminal usage, focusing on PWD, CD, LS, directory management, file operations, and system commands, essential for pen testing and Linux usage.', 'The chapter outlines essential commands like PWD, CD, LS, directory management, file operations, and system commands, providing a comprehensive foundation for learners in pen testing and Linux usage.', 'The instructor emphasizes the significance of understanding terminal commands, including essential operations like directory navigation, file management, and system commands, crucial for pen testing and Linux usage.']}, {'end': 2477.02, 'start': 1854.932, 'title': 'Navigating the linux file system', 'summary': 'Covers navigating the linux file system through commands like pwd, cd, ls, mkdir, and locate, providing insights on file navigation, directory creation, and file movement, with tips on hidden folders and file locating.', 'duration': 622.088, 'highlights': ['The chapter covers navigating the Linux file system through commands like PWD, CD, LS, MKDIR, and locate, providing insights on file navigation, directory creation, and file movement, with tips on hidden folders and file locating.', 'The PWD command stands for Present Working Directory, allowing users to identify their current location in the file system, providing a fundamental understanding of where they are located in the system.', 'The CD command, which stands for Change Directory, allows users to move to different directories within the file system, enabling seamless navigation and exploration of various folders and directories.', "The LS command lists everything in the current directory, providing a visual representation of the contents within the folder, including color coordination to differentiate between folders and files, offering a comprehensive view of the directory's contents.", 'The MKDIR command enables users to create new directories within the file system, allowing for the organization and structuring of data and information, facilitating efficient file management and storage.', 'The locate feature allows users to search for specific files within the system, providing a way to locate files based on their names or specific attributes, enhancing the ability to find and access relevant files within the file system.', 'The chapter emphasizes the importance of taking notes and using tools like CherryTree, KeepNote, or notepads for an enhanced learning experience, ensuring that users are well-equipped to grasp the concepts and commands discussed.', 'The chapter advises watching the video multiple times to aid in understanding the commands and concepts, highlighting the value of repetition and practice in mastering the navigation and manipulation of the Linux file system.']}], 'duration': 753.217, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/lZAoFs75_cs/pics/lZAoFs75_cs1723803.jpg', 'highlights': ['The chapter emphasizes Kali Linux as a foundational OS for learning, focusing on terminal usage and essential commands, catering to beginners in Linux and pen testing.', 'The instructor highlights the importance of terminal usage, focusing on PWD, CD, LS, directory management, file operations, and system commands, essential for pen testing and Linux usage.', 'The chapter outlines essential commands like PWD, CD, LS, directory management, file operations, and system commands, providing a comprehensive foundation for learners in pen testing and Linux usage.', 'The instructor emphasizes the significance of understanding terminal commands, including essential operations like directory navigation, file management, and system commands, crucial for pen testing and Linux usage.', 'The chapter covers navigating the Linux file system through commands like PWD, CD, LS, MKDIR, and locate, providing insights on file navigation, directory creation, and file movement, with tips on hidden folders and file locating.', 'The PWD command stands for Present Working Directory, allowing users to identify their current location in the file system, providing a fundamental understanding of where they are located in the system.', 'The CD command, which stands for Change Directory, allows users to move to different directories within the file system, enabling seamless navigation and exploration of various folders and directories.', "The LS command lists everything in the current directory, providing a visual representation of the contents within the folder, including color coordination to differentiate between folders and files, offering a comprehensive view of the directory's contents.", 'The MKDIR command enables users to create new directories within the file system, allowing for the organization and structuring of data and information, facilitating efficient file management and storage.', 'The locate feature allows users to search for specific files within the system, providing a way to locate files based on their names or specific attributes, enhancing the ability to find and access relevant files within the file system.']}, {'end': 3223.688, 'segs': [{'end': 2559.604, 'src': 'embed', 'start': 2528.655, 'weight': 4, 'content': [{'end': 2530.136, 'text': 'Most commands come with a man page.', 'start': 2528.655, 'duration': 1.481}, {'end': 2534.598, 'text': "Let's say we want to look at ls, we can say man ls.", 'start': 2531.176, 'duration': 3.422}, {'end': 2540.355, 'text': "And then it's going to give us all this information here about LS.", 'start': 2535.933, 'duration': 4.422}, {'end': 2543.576, 'text': 'So if you see it says LS is list directory contents.', 'start': 2540.635, 'duration': 2.941}, {'end': 2546.557, 'text': 'Awesome And then it gives you what options we can do.', 'start': 2544.376, 'duration': 2.181}, {'end': 2555.921, 'text': 'Well, we can do a dash a for all, which you saw earlier, and you can kind of scroll through here and just see exactly what it has to offer.', 'start': 2547.117, 'duration': 8.804}, {'end': 2559.604, 'text': "And that's kind of it.", 'start': 2558.743, 'duration': 0.861}], 'summary': "Man pages provide detailed information about commands, e.g., 'ls' lists directory contents and offers options like '-a' for all.", 'duration': 30.949, 'max_score': 2528.655, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/lZAoFs75_cs/pics/lZAoFs75_cs2528655.jpg'}, {'end': 2646.467, 'src': 'embed', 'start': 2616.429, 'weight': 2, 'content': [{'end': 2619.232, 'text': "From there we're going to talk about the chmod command,", 'start': 2616.429, 'duration': 2.803}, {'end': 2626.358, 'text': "which is the change mode command that's going to let us change the permissions on a file or directory.", 'start': 2619.232, 'duration': 7.126}, {'end': 2631.582, 'text': "We're also going to talk about how we're going to add a user with the add user command.", 'start': 2626.378, 'duration': 5.204}, {'end': 2636.104, 'text': "From there, we're going to take a look at a couple of important files.", 'start': 2632.623, 'duration': 3.481}, {'end': 2641.025, 'text': 'One is the Etsy password file, and the other is the Etsy shadow file.', 'start': 2636.264, 'duration': 4.761}, {'end': 2646.467, 'text': 'So the Etsy password file is not actually where the passwords are stored on a machine.', 'start': 2641.706, 'duration': 4.761}], 'summary': 'Chmod to change file permissions, add user, and important system files explained.', 'duration': 30.038, 'max_score': 2616.429, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/lZAoFs75_cs/pics/lZAoFs75_cs2616429.jpg'}, {'end': 2694.582, 'src': 'embed', 'start': 2664.937, 'weight': 1, 'content': [{'end': 2668.8, 'text': "And then we're going to talk about SU, which is the switch user command.", 'start': 2664.937, 'duration': 3.863}, {'end': 2677.126, 'text': "And finally, we'll talk about sudo, which is a command that allows you to elevate your privileges on a Linux machine.", 'start': 2669.461, 'duration': 7.665}, {'end': 2680.408, 'text': "So let's go ahead and dive right into our lesson.", 'start': 2677.766, 'duration': 2.642}, {'end': 2683.991, 'text': "Okay, so now we're going to cover users and privileges.", 'start': 2681.289, 'duration': 2.702}, {'end': 2689.937, 'text': 'So in the last video, we touched a little bit on privileges with our LS dash la.', 'start': 2684.832, 'duration': 5.105}, {'end': 2694.582, 'text': 'And we touched a little bit on users by changing the password of our root account.', 'start': 2690.898, 'duration': 3.684}], 'summary': 'Covered su, switch user command, and sudo for privilege elevation on linux.', 'duration': 29.645, 'max_score': 2664.937, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/lZAoFs75_cs/pics/lZAoFs75_cs2664937.jpg'}, {'end': 2840.547, 'src': 'embed', 'start': 2815.814, 'weight': 0, 'content': [{'end': 2825.622, 'text': 'However, we could also be looking for other full rewrite execute files where we need to modify them and give us root access to a system.', 'start': 2815.814, 'duration': 9.808}, {'end': 2835.786, 'text': "It's all about insecure configurations, and we're going to cover that more once we get into the actual penetration testing part of the course.", 'start': 2826.122, 'duration': 9.664}, {'end': 2840.547, 'text': 'For the Linux essentials part of the course, all we need to worry about is these file permissions.', 'start': 2835.826, 'duration': 4.721}], 'summary': 'Cover insecure configurations in penetration testing, focus on linux file permissions.', 'duration': 24.733, 'max_score': 2815.814, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/lZAoFs75_cs/pics/lZAoFs75_cs2815814.jpg'}, {'end': 3040.388, 'src': 'embed', 'start': 3015.055, 'weight': 3, 'content': [{'end': 3021.258, 'text': "So this Etsy password file, you're gonna become very familiar with because it shows you all the users.", 'start': 3015.055, 'duration': 6.203}, {'end': 3024.739, 'text': "Now there's a lot of times where you're doing penetration testing.", 'start': 3021.518, 'duration': 3.221}, {'end': 3029.281, 'text': "you're gonna have access to this Etsy password file because it doesn't provide the password anymore.", 'start': 3024.739, 'duration': 4.542}, {'end': 3030.802, 'text': 'It used to a long time ago.', 'start': 3029.401, 'duration': 1.401}, {'end': 3033.283, 'text': 'Passwords are now in the shadow file.', 'start': 3031.522, 'duration': 1.761}, {'end': 3040.388, 'text': 'So you actually have a little bit of access and information disclosure here at the hands of poor configuration.', 'start': 3033.743, 'duration': 6.645}], 'summary': 'Etsy password file reveals user information, indicating poor configuration.', 'duration': 25.333, 'max_score': 3015.055, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/lZAoFs75_cs/pics/lZAoFs75_cs3015055.jpg'}], 'start': 2478.381, 'title': 'Secure passwords, man pages, and file permissions', 'summary': 'Emphasizes the importance of secure passwords, demonstrates usage of man pages, and covers file permission commands such as chmod, add user, and su and sudo commands, relevant to penetration testing.', 'chapters': [{'end': 2589.609, 'start': 2478.381, 'title': 'Secure password and man pages', 'summary': 'Covers the importance of changing default passwords for security, providing an example of a secure password, and utilizing man pages for command instructions.', 'duration': 111.228, 'highlights': ['Changing the default password is important for security; a strong, secure password should be used to enhance security measures.', "The 'man' command provides instructions for any command being run, facilitating better understanding and utilization of commands.", 'Man pages offer comprehensive information about commands, including available options and their functionalities.', 'Using a secure password instead of a default one is crucial for enhancing security measures and protecting the user account.']}, {'end': 3223.688, 'start': 2590.109, 'title': 'Users & privileges: managing file permissions', 'summary': 'Covers user privileges overview, file permission commands like chmod, adding users with add user command, importance of etsy password and shadow files, and using su and sudo commands to manage user privileges, with emphasis on file permission settings and their relevance to penetration testing.', 'duration': 633.579, 'highlights': ['The chapter covers user privileges overview, file permission commands like chmod, adding users with add user command, importance of Etsy password and shadow files, and using SU and sudo commands to manage user privileges, with emphasis on file permission settings and their relevance to penetration testing.', 'Understanding file permissions is crucial in penetration testing as it helps identify folders with full read-write access, essential for uploading and executing exploits, and finding configurations that can lead to root access.', "The CHMOD command allows changing file permissions, with 'chmod 777' providing full read-write access, and understanding these commands is essential for security management and configuration of files.", "Adding a user with 'add user' command and managing user privileges using SU and sudo commands are important for ensuring proper access and permissions, with the sudoers file determining which users can change permissions.", 'Access to Etsy password and shadow files in penetration testing can provide valuable information for potential password cracking and user access, highlighting the importance of securing these files.']}], 'duration': 745.307, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/lZAoFs75_cs/pics/lZAoFs75_cs2478381.jpg', 'highlights': ['Understanding file permissions is crucial in penetration testing as it helps identify folders with full read-write access, essential for uploading and executing exploits, and finding configurations that can lead to root access.', "Adding a user with 'add user' command and managing user privileges using SU and sudo commands are important for ensuring proper access and permissions, with the sudoers file determining which users can change permissions.", "The CHMOD command allows changing file permissions, with 'chmod 777' providing full read-write access, and understanding these commands is essential for security management and configuration of files.", 'Access to Etsy password and shadow files in penetration testing can provide valuable information for potential password cracking and user access, highlighting the importance of securing these files.', "The 'man' command provides instructions for any command being run, facilitating better understanding and utilization of commands."]}, {'end': 3753.94, 'segs': [{'end': 3275.663, 'src': 'embed', 'start': 3245.758, 'weight': 0, 'content': [{'end': 3249.72, 'text': "All right, so now we're going to be covering common network commands.", 'start': 3245.758, 'duration': 3.962}, {'end': 3255.833, 'text': "So before we dive into the commands we're going to learn, I'm going to go on a tiny bit of a rant here.", 'start': 3250.27, 'duration': 5.563}, {'end': 3261.817, 'text': 'So if you are not familiar with networking, now is the time to become familiar with networking.', 'start': 3256.694, 'duration': 5.123}, {'end': 3269.742, 'text': 'There are two things I think that a person needs before they really can dive into pentesting, and that is Linux experience.', 'start': 3262.537, 'duration': 7.205}, {'end': 3275.663, 'text': 'which you are gaining some Linux experience now because most pen testing is done in Linux.', 'start': 3270.402, 'duration': 5.261}], 'summary': 'Covering common network commands and importance of linux experience for pentesting.', 'duration': 29.905, 'max_score': 3245.758, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/lZAoFs75_cs/pics/lZAoFs75_cs3245758.jpg'}, {'end': 3386.711, 'src': 'embed', 'start': 3361.246, 'weight': 4, 'content': [{'end': 3370.697, 'text': "Ping is a ping command where we talk over ICMP, and we try to communicate to another machine to see if it's alive and responding back to us.", 'start': 3361.246, 'duration': 9.451}, {'end': 3376.524, 'text': "And we've got the ARP command, which just maps IP addresses to MAC addresses.", 'start': 3371.378, 'duration': 5.146}, {'end': 3379.007, 'text': "And we've got netstat.", 'start': 3377.305, 'duration': 1.702}, {'end': 3386.711, 'text': "which is just a command line tool that's going to allow us to display all connections and listening ports.", 'start': 3379.628, 'duration': 7.083}], 'summary': 'Network commands like ping, arp, and netstat are used for checking connectivity and displaying connections.', 'duration': 25.465, 'max_score': 3361.246, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/lZAoFs75_cs/pics/lZAoFs75_cs3361246.jpg'}, {'end': 3439.58, 'src': 'embed', 'start': 3411.855, 'weight': 1, 'content': [{'end': 3415.276, 'text': 'So the first command I want to cover is ifconfig.', 'start': 3411.855, 'duration': 3.421}, {'end': 3422.219, 'text': 'So you may be familiar with the Windows version of this, which is ipconfig, and they pretty much do the same thing.', 'start': 3415.796, 'duration': 6.423}, {'end': 3429.563, 'text': 'So it shows you here your different interface types and the IP address associated with them.', 'start': 3423.12, 'duration': 6.443}, {'end': 3439.58, 'text': 'So ETH0 here, Ethernet 0, has an IP address of 192.168.', 'start': 3430.183, 'duration': 9.397}], 'summary': 'Ifconfig command displays ip addresses for different interface types, such as eth0 with an ip address of 192.168.', 'duration': 27.725, 'max_score': 3411.855, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/lZAoFs75_cs/pics/lZAoFs75_cs3411855.jpg'}, {'end': 3629.576, 'src': 'embed', 'start': 3570.253, 'weight': 5, 'content': [{'end': 3573.576, 'text': 'So if an IP address reaches out, say 192.168.', 'start': 3570.253, 'duration': 3.323}, {'end': 3575.618, 'text': '15.1 talked out to this machine.', 'start': 3573.576, 'duration': 2.042}, {'end': 3581.603, 'text': "It's going to say OK, hey, who are you?", 'start': 3579.682, 'duration': 1.921}, {'end': 3584.925, 'text': "It's going to send a broadcast message out to say who has this IP address?", 'start': 3581.683, 'duration': 3.242}, {'end': 3587.346, 'text': 'And then the IP address will respond.', 'start': 3585.585, 'duration': 1.761}, {'end': 3589.828, 'text': 'It says, hey, I do, and this is my MAC address.', 'start': 3587.366, 'duration': 2.462}, {'end': 3594.19, 'text': 'So ARP is just a way of associating IP addresses with MAC addresses.', 'start': 3590.368, 'duration': 3.822}, {'end': 3599.813, 'text': 'And once you know that, you can also look at netstat.', 'start': 3596.491, 'duration': 3.322}, {'end': 3605.036, 'text': 'So netstat-ano is another one of my favorite commands.', 'start': 3600.413, 'duration': 4.623}, {'end': 3609.706, 'text': 'And this shows you just the active connections that are running on your machine.', 'start': 3606.604, 'duration': 3.102}, {'end': 3620.791, 'text': "So if we scroll way up, and you can just kind of see what's open and what's talking here.", 'start': 3610.406, 'duration': 10.385}, {'end': 3629.576, 'text': 'Where this really comes in handy on a penetration test is to see if a machine is talking to somebody else.', 'start': 3621.912, 'duration': 7.664}], 'summary': 'Arp associates ip addresses with mac addresses. netstat-ano shows active connections.', 'duration': 59.323, 'max_score': 3570.253, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/lZAoFs75_cs/pics/lZAoFs75_cs3570253.jpg'}, {'end': 3716.723, 'src': 'embed', 'start': 3682.557, 'weight': 7, 'content': [{'end': 3685.079, 'text': "If you type in route, that's going to print your routing table.", 'start': 3682.557, 'duration': 2.522}, {'end': 3693.542, 'text': 'And the routing table is important because it tells you where your traffic exits, essentially.', 'start': 3686.454, 'duration': 7.088}, {'end': 3697.306, 'text': 'So for this VM, my traffic is exiting on 192.168.', 'start': 3693.942, 'duration': 3.364}, {'end': 3698.587, 'text': '134.0 So any traffic goes out of this 0.0.', 'start': 3697.306, 'duration': 1.281}, {'end': 3699.648, 'text': '0.0 gateway in this range right?', 'start': 3698.587, 'duration': 1.061}, {'end': 3716.723, 'text': "so when it goes out this gateway, it's doing nat, so network address translation, and it's running off my computer.", 'start': 3708.738, 'duration': 7.985}], 'summary': 'Viewing the routing table reveals traffic exit points. vm traffic exits at 192.168.134.0 via nat.', 'duration': 34.166, 'max_score': 3682.557, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/lZAoFs75_cs/pics/lZAoFs75_cs3682557.jpg'}], 'start': 3224.269, 'title': 'Network commands for penetration testing', 'summary': 'Emphasizes the importance of networking knowledge and linux experience for penetration testing, covering essential commands such as ifconfig, iwconfig, ping, arp, netstat, and route, providing insights into ip addresses, mac addresses, active connections, and routing tables.', 'chapters': [{'end': 3338.937, 'start': 3224.269, 'title': 'Penetration testing: network commands', 'summary': 'Covers the importance of networking knowledge and introduces common network commands essential for penetration testing, emphasizing the significance of linux experience and a strong network foundation.', 'duration': 114.668, 'highlights': ['The significance of Linux experience and a strong network foundation before diving into penetration testing, as most pen testing is done in Linux.', 'Emphasizing the importance of understanding common network commands such as ifconfig, ping, arp, netstat, and route for effective penetration testing.', 'The relevance of gaining Linux experience and networking knowledge for successful navigation and troubleshooting within networks during penetration testing.']}, {'end': 3753.94, 'start': 3339.517, 'title': 'Network commands overview', 'summary': 'Covers essential network commands, including ifconfig, iwconfig, ping, arp, netstat, and route, providing insights into ip addresses, mac addresses, active connections, and routing tables, crucial for networking and penetration testing.', 'duration': 414.423, 'highlights': ['The ifconfig and ipconfig commands provide information about interface types, IP addresses, net mask, broadcast address, and MAC addresses, essential for networking and penetration testing.', 'The ping command is used to communicate with other machines over ICMP, indicating if they are alive and responding, crucial for network troubleshooting and testing.', 'The ARP command maps IP addresses to MAC addresses, providing crucial information for associating IP addresses with MAC addresses in a network.', 'The netstat command displays active connections and listening ports, enabling users to monitor communication between machines and identify potential security risks.', 'The route command prints the routing table, essential for understanding the path of network traffic and identifying potential routes for communication.']}], 'duration': 529.671, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/lZAoFs75_cs/pics/lZAoFs75_cs3224269.jpg', 'highlights': ['The significance of Linux experience and a strong network foundation before diving into penetration testing, as most pen testing is done in Linux.', 'The ifconfig and ipconfig commands provide information about interface types, IP addresses, net mask, broadcast address, and MAC addresses, essential for networking and penetration testing.', 'Emphasizing the importance of understanding common network commands such as ifconfig, ping, arp, netstat, and route for effective penetration testing.', 'The relevance of gaining Linux experience and networking knowledge for successful navigation and troubleshooting within networks during penetration testing.', 'The ping command is used to communicate with other machines over ICMP, indicating if they are alive and responding, crucial for network troubleshooting and testing.', 'The ARP command maps IP addresses to MAC addresses, providing crucial information for associating IP addresses with MAC addresses in a network.', 'The netstat command displays active connections and listening ports, enabling users to monitor communication between machines and identify potential security risks.', 'The route command prints the routing table, essential for understanding the path of network traffic and identifying potential routes for communication.']}, {'end': 5402.82, 'segs': [{'end': 3825.951, 'src': 'embed', 'start': 3797.34, 'weight': 3, 'content': [{'end': 3803.163, 'text': "We're going to look at the cat command, which is going to print out a document for us.", 'start': 3797.34, 'duration': 5.823}, {'end': 3805.984, 'text': "It's similar to type in Windows.", 'start': 3803.243, 'duration': 2.741}, {'end': 3812.53, 'text': "We'll talk about replacing versus appending and which function does which and how to do it.", 'start': 3807.045, 'duration': 5.485}, {'end': 3819.216, 'text': "We're going to talk about the touch command, which can be used to create a file on the fly.", 'start': 3813.491, 'duration': 5.725}, {'end': 3825.951, 'text': "We'll talk about Nano, which is a text editor that's built into the terminal.", 'start': 3820.165, 'duration': 5.786}], 'summary': 'The transcript covers cat, touch, and nano commands for file management in the terminal.', 'duration': 28.611, 'max_score': 3797.34, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/lZAoFs75_cs/pics/lZAoFs75_cs3797340.jpg'}, {'end': 4162.921, 'src': 'embed', 'start': 4132.828, 'weight': 4, 'content': [{'end': 4135.471, 'text': "Let's go ahead and cat it out and see what happens.", 'start': 4132.828, 'duration': 2.643}, {'end': 4137.835, 'text': 'Okay, you can see that the new line is in there.', 'start': 4135.492, 'duration': 2.343}, {'end': 4141.557, 'text': "So really that's the overview that I wanted to cover.", 'start': 4139.136, 'duration': 2.421}, {'end': 4151.457, 'text': 'So just know that you can create files pretty much using echo, touch, and actually you can create files using nano as well.', 'start': 4141.837, 'duration': 9.62}, {'end': 4158.76, 'text': "If you say nano, this is new.txt, I'll just say hello, control x, save it.", 'start': 4151.518, 'duration': 7.242}, {'end': 4162.921, 'text': 'If you ls, you can see this is new.txt is right here.', 'start': 4158.779, 'duration': 4.142}], 'summary': 'Demonstrating file creation using various commands like echo, touch, and nano.', 'duration': 30.093, 'max_score': 4132.828, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/lZAoFs75_cs/pics/lZAoFs75_cs4132828.jpg'}, {'end': 4243.087, 'src': 'embed', 'start': 4222.6, 'weight': 0, 'content': [{'end': 4232.343, 'text': 'And the systemctl command is going to allow us to enable or disable services so that they load up on boot or do not load up on boot.', 'start': 4222.6, 'duration': 9.743}, {'end': 4238.585, 'text': "So let's talk a little bit more about services and look at how these commands can be useful for pentesting.", 'start': 4232.763, 'duration': 5.822}, {'end': 4243.087, 'text': "All right, so let's talk about starting and stopping services.", 'start': 4239.966, 'duration': 3.121}], 'summary': 'Systemctl enables/disables services for boot. useful for pentesting.', 'duration': 20.487, 'max_score': 4222.6, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/lZAoFs75_cs/pics/lZAoFs75_cs4222600.jpg'}, {'end': 4776.945, 'src': 'embed', 'start': 4755.088, 'weight': 2, 'content': [{'end': 4763.351, 'text': "So we're going to actually have to use GitHub and maybe use a tool called get to download tools, or other items from GitHub.", 'start': 4755.088, 'duration': 8.263}, {'end': 4766.152, 'text': 'But this is just going to be one example.', 'start': 4764.211, 'duration': 1.941}, {'end': 4770.214, 'text': "But it's a very, very common example that you may have to do as a pen tester.", 'start': 4766.192, 'duration': 4.022}, {'end': 4776.945, 'text': "So let's dive in and take a look at how we can use these commands to install tools and update tools.", 'start': 4770.874, 'duration': 6.071}], 'summary': "Using github and 'git' to download and install tools for pen testing.", 'duration': 21.857, 'max_score': 4755.088, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/lZAoFs75_cs/pics/lZAoFs75_cs4755088.jpg'}, {'end': 4866.737, 'src': 'heatmap', 'start': 4790.632, 'weight': 1, 'content': [{'end': 4794.754, 'text': "So for Kali, since it's a Debian base, we're going to use something called apt-get.", 'start': 4790.632, 'duration': 4.122}, {'end': 4798.315, 'text': "And the first thing I'm going to show you is how to install updates.", 'start': 4795.374, 'duration': 2.941}, {'end': 4805.938, 'text': "So the common way to do this, if you don't use the GUI and you want to use the terminal, is apt-get update.", 'start': 4799.035, 'duration': 6.903}, {'end': 4811.238, 'text': "And then we'll do and apt get upgrade.", 'start': 4807.196, 'duration': 4.042}, {'end': 4813.959, 'text': "Let's go ahead and just hit enter on this.", 'start': 4812.158, 'duration': 1.801}, {'end': 4817.08, 'text': "Let's explain what it's doing.", 'start': 4815.819, 'duration': 1.261}, {'end': 4821.202, 'text': 'So the first command here is saying apt get update.', 'start': 4817.92, 'duration': 3.282}, {'end': 4823.803, 'text': "So what we're doing is we're looking through packages.", 'start': 4821.522, 'duration': 2.281}, {'end': 4826.704, 'text': 'Now these packages are predefined their repositories.', 'start': 4824.003, 'duration': 2.701}, {'end': 4831.526, 'text': "And what it does is it says, Okay, I'm going to check packages here for updates.", 'start': 4827.684, 'duration': 3.842}, {'end': 4836.401, 'text': 'And it went through, it looks like they use archive Linux Duke.edu.', 'start': 4832.76, 'duration': 3.641}, {'end': 4841.363, 'text': 'They check these packages here and they update the packages.', 'start': 4836.841, 'duration': 4.522}, {'end': 4845.184, 'text': 'And then once they update the packages, they run this command.', 'start': 4841.383, 'duration': 3.801}, {'end': 4854.267, 'text': "So basically the and command is you're going to do something as well, right? So first we're going to update and then we're going to upgrade.", 'start': 4845.264, 'duration': 9.003}, {'end': 4860.295, 'text': "So, based on what's in these packages, it's going to say okay, well, we know.", 'start': 4854.887, 'duration': 5.408}, {'end': 4863.576, 'text': 'the following packages were automatically installed and no longer required', 'start': 4860.295, 'duration': 3.281}, {'end': 4866.737, 'text': "So all these things right here, they're going to be removed.", 'start': 4863.616, 'duration': 3.121}], 'summary': 'Using apt-get to update and upgrade packages in kali linux.', 'duration': 76.105, 'max_score': 4790.632, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/lZAoFs75_cs/pics/lZAoFs75_cs4790632.jpg'}, {'end': 4900.907, 'src': 'embed', 'start': 4868.058, 'weight': 1, 'content': [{'end': 4870.899, 'text': 'And then the following packages have been kept back.', 'start': 4868.058, 'duration': 2.841}, {'end': 4872.239, 'text': "Okay They're fine.", 'start': 4871.239, 'duration': 1}, {'end': 4874.86, 'text': "They're not going to uninstall those.", 'start': 4873.32, 'duration': 1.54}, {'end': 4878.061, 'text': 'And then we have the following packages that are going to be upgraded.', 'start': 4875.16, 'duration': 2.901}, {'end': 4881.703, 'text': "Okay So it's a long list that needs updating.", 'start': 4879.262, 'duration': 2.441}, {'end': 4889.805, 'text': 'And then you come in here and you say, okay, well it needs 252 megabytes of additional space to continue.', 'start': 4882.503, 'duration': 7.302}, {'end': 4891.945, 'text': 'You could hit enter for yes.', 'start': 4890.285, 'duration': 1.66}, {'end': 4894.306, 'text': "And they'll automatically start upgrading.", 'start': 4892.505, 'duration': 1.801}, {'end': 4900.907, 'text': 'So if you want to update your machine to its newest and best form, you can go ahead and do that.', 'start': 4895.026, 'duration': 5.881}], 'summary': '252 megabytes needed for upgrading. update for newest and best form.', 'duration': 32.849, 'max_score': 4868.058, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/lZAoFs75_cs/pics/lZAoFs75_cs4868058.jpg'}, {'end': 5205.075, 'src': 'embed', 'start': 5181.734, 'weight': 5, 'content': [{'end': 5188.819, 'text': 'So we used apt-get update and upgrade to install updates in our system.', 'start': 5181.734, 'duration': 7.085}, {'end': 5197.146, 'text': 'We used git clone to be able to download packages and clone packages off of GitHub.', 'start': 5189.94, 'duration': 7.206}, {'end': 5202.29, 'text': 'And we used apt-get to be able to download git itself.', 'start': 5198.487, 'duration': 3.803}, {'end': 5205.075, 'text': "So that's really it for this lesson.", 'start': 5203.513, 'duration': 1.562}], 'summary': 'Installed updates using apt-get, cloned packages with git, and downloaded git using apt-get.', 'duration': 23.341, 'max_score': 5181.734, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/lZAoFs75_cs/pics/lZAoFs75_cs5181734.jpg'}], 'start': 3754.56, 'title': 'Basic terminal commands and tools', 'summary': 'Covers terminal commands for viewing, creating, and editing files, file creation and editing tools, controlling kali services, installing and updating tools, and bash scripting basics and git installation. it introduces various commands and tools, such as echo, cat, touch, nano, gedit, service, systemctl, and apt-get, highlighting their practical application in file management, service control, and tool installation in kali linux.', 'chapters': [{'end': 3961.599, 'start': 3754.56, 'title': 'Terminal commands for viewing, creating, and editing files', 'summary': 'Covers viewing, creating, and editing files in the terminal and introduces commands like echo, cat, touch, nano, and gedit, with emphasis on creating quick text documents and understanding appending and replacing functions.', 'duration': 207.039, 'highlights': ['The chapter introduces commands like echo, cat, touch, Nano, and gedit for creating and editing files, emphasizing the ability to create quick text documents.', 'It explains the functionality of echo command to write to a file and demonstrates the cat command for printing out the content of a file.', 'The chapter provides insights into appending and replacing functions, highlighting the significance of using the correct symbols to append or overwrite content in a file.']}, {'end': 4184.216, 'start': 3962.58, 'title': 'File creation and editing tools', 'summary': 'Covers creating and editing files in linux using commands like echo, touch, and nano, as well as using graphical interface tool gedit, providing insights on their usage and benefits, and mentioning their relevance in penetration testing for file transfers via ftp.', 'duration': 221.636, 'highlights': ['The chapter covers creating and editing files in Linux using commands like echo, touch, and nano, as well as using graphical interface tool gedit, providing insights on their usage and benefits, and mentioning their relevance in penetration testing for file transfers via FTP.', 'Using commands like echo, touch, and nano, users can efficiently create and edit files in Linux, providing flexibility and ease in file management.', 'The usage of nano, a terminal text editor, is emphasized for creating scripts, Python scripts, and shell code, with a demonstration of its functionality and file editing capabilities.']}, {'end': 4685.467, 'start': 4185.026, 'title': 'Controlling kali services', 'summary': 'Covers controlling kali services using the service and systemctl commands, demonstrating how to start and stop services, enable/disable services to load on boot, and the importance of certain services for pentesting such as apache 2 and postgresql.', 'duration': 500.441, 'highlights': ['The systemctl command enables services to load on boot, saving time and ensuring important services like PostgreSQL are running, which is crucial for efficient use of Metasploit in pentesting.', 'Demonstrating the use of service command to start and stop services like Apache 2, and the importance of starting services permanently on boot for continuous functionality.', "Explaining the ease and advantages of spinning up a web server using Python's simple HTTP server as an alternative to Apache 2 for hosting files and serving content."]}, {'end': 4891.945, 'start': 4685.988, 'title': 'Installing and updating tools', 'summary': "Discusses how to install updates and tools using apt-get in kali, including the process of updating packages, upgrading packages, and installing tools from github, which may require the use of 'get' to clone from a website.", 'duration': 205.957, 'highlights': ['The process of updating and upgrading packages using apt-get, which may require additional space of 252 megabytes to continue.', "Installing tools from GitHub using 'get' to clone from a website, which is a common example for pen testers.", "The recommendation to use 'systemctl' for PostgreSQL instead of Apache 2 on boot."]}, {'end': 5402.82, 'start': 4892.505, 'title': 'Bash scripting basics and git installation', 'summary': 'Covers the basics of bash scripting, including installing git using apt-get and cloning packages from github, as well as scripting a ping sweeper script using grep, cut, and tr, with an emphasis on hands-on learning and practical application.', 'duration': 510.315, 'highlights': ['The chapter covers the basics of bash scripting, including installing Git using apt-get and cloning packages from GitHub.', 'Scripting a ping sweeper script using grep, cut, and tr, with an emphasis on hands-on learning and practical application.']}], 'duration': 1648.26, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/lZAoFs75_cs/pics/lZAoFs75_cs3754560.jpg', 'highlights': ['The systemctl command enables services to load on boot, crucial for efficient use of Metasploit (Paragraph 3)', 'The process of updating and upgrading packages using apt-get, requiring additional space of 252 megabytes (Paragraph 4)', "Installing tools from GitHub using 'get' to clone from a website, a common example for pen testers (Paragraph 4)", 'The chapter introduces commands like echo, cat, touch, Nano, and gedit for creating and editing files (Paragraph 1)', 'The chapter covers creating and editing files in Linux using commands like echo, touch, and nano, as well as using graphical interface tool gedit (Paragraph 2)', 'The chapter covers the basics of bash scripting, including installing Git using apt-get and cloning packages from GitHub (Paragraph 5)']}, {'end': 6445.898, 'segs': [{'end': 5587.231, 'src': 'embed', 'start': 5564.112, 'weight': 2, 'content': [{'end': 5573.56, 'text': '1.1 all the way through 255, and we want to see who responds back and then take that list and narrow it down to the IP addresses,', 'start': 5564.112, 'duration': 9.448}, {'end': 5575.442, 'text': "which is exactly what we're going to be doing.", 'start': 5573.56, 'duration': 1.882}, {'end': 5578.004, 'text': 'we need to know how to narrow that down.', 'start': 5575.442, 'duration': 2.562}, {'end': 5583.168, 'text': "So what we're going to be narrowing down on specifically is the 64 bytes.", 'start': 5579.725, 'duration': 3.443}, {'end': 5587.231, 'text': "So let's tab up a couple times to this cat IP address.", 'start': 5584.089, 'duration': 3.142}], 'summary': 'Scanning ip addresses from 1.1 to 255 to identify responsive ones and narrowing down to 64 bytes.', 'duration': 23.119, 'max_score': 5564.112, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/lZAoFs75_cs/pics/lZAoFs75_cs5564112.jpg'}, {'end': 5783.387, 'src': 'embed', 'start': 5754.215, 'weight': 3, 'content': [{'end': 5758.497, 'text': "So I've gone ahead and written out a script, but we're going to talk about it very slowly.", 'start': 5754.215, 'duration': 4.282}, {'end': 5760.577, 'text': 'So you can actually look at it and copy it down.', 'start': 5758.537, 'duration': 2.04}, {'end': 5764.359, 'text': "So what we're going to do is go ahead and say G edit.", 'start': 5761.418, 'duration': 2.941}, {'end': 5768.641, 'text': 'And I called this IP sweep dot S H.', 'start': 5765.26, 'duration': 3.381}, {'end': 5772.163, 'text': 'So go ahead and do the same or something similar and hit enter.', 'start': 5768.641, 'duration': 3.522}, {'end': 5775.164, 'text': "So let's take a look at this script.", 'start': 5773.563, 'duration': 1.601}, {'end': 5779.705, 'text': "So at the very top here, we have to declare what we're doing.", 'start': 5776.943, 'duration': 2.762}, {'end': 5783.387, 'text': "So we're going to give a hash bang, and we do this with any scripting language.", 'start': 5780.125, 'duration': 3.262}], 'summary': 'Script written for ip sweep, emphasizing declaration and usage of hash bang.', 'duration': 29.172, 'max_score': 5754.215, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/lZAoFs75_cs/pics/lZAoFs75_cs5754215.jpg'}, {'end': 5910.112, 'src': 'embed', 'start': 5880.21, 'weight': 1, 'content': [{'end': 5886.812, 'text': "If we say for one, in this ping sweep, we're going to do that, right.", 'start': 5880.21, 'duration': 6.602}, {'end': 5892.733, 'text': "So we're going to say, for 14243, all the way through 254.", 'start': 5886.912, 'duration': 5.821}, {'end': 5894.094, 'text': "That's what this loop is doing.", 'start': 5892.733, 'duration': 1.361}, {'end': 5896.134, 'text': "So it's a very, very simple loop.", 'start': 5894.634, 'duration': 1.5}, {'end': 5900.896, 'text': 'Now, IP is replaced down here at the very end.', 'start': 5896.915, 'duration': 3.981}, {'end': 5904.408, 'text': "Now we're also calling out this dollar sign one.", 'start': 5901.806, 'duration': 2.602}, {'end': 5907.35, 'text': 'Now this dollar sign one is user input.', 'start': 5904.888, 'duration': 2.462}, {'end': 5910.112, 'text': "So we're going to actually do something.", 'start': 5908.231, 'duration': 1.881}], 'summary': 'Using a simple loop to perform a ping sweep from 14243 to 254, with user input.', 'duration': 29.902, 'max_score': 5880.21, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/lZAoFs75_cs/pics/lZAoFs75_cs5880210.jpg'}, {'end': 6350.313, 'src': 'embed', 'start': 6316.305, 'weight': 0, 'content': [{'end': 6319.025, 'text': "What do we want to do? Let's run an Nmap script.", 'start': 6316.305, 'duration': 2.72}, {'end': 6329.427, 'text': "We're going to say do Nmap and we'll do a port 80 on all of these and we'll say stealth scan,", 'start': 6319.746, 'duration': 9.681}, {'end': 6336.669, 'text': "that on port 80 and we'll do T4 for a speed and that should be it.", 'start': 6329.427, 'duration': 7.242}, {'end': 6343.35, 'text': 'Then we can do done like this and let it run through one at a time.', 'start': 6337.389, 'duration': 5.961}, {'end': 6347.912, 'text': 'we can also do the ampersand and let it run multiples like this.', 'start': 6343.35, 'duration': 4.562}, {'end': 6350.313, 'text': 'we can hit enter and see what that does.', 'start': 6347.912, 'duration': 2.401}], 'summary': 'Run nmap script to perform stealth scan on port 80 with speed t4.', 'duration': 34.008, 'max_score': 6316.305, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/lZAoFs75_cs/pics/lZAoFs75_cs6316305.jpg'}], 'start': 5403.901, 'title': 'Ip address scripting and nmap scanning', 'summary': 'Covers narrowing down ping results, crafting an ip sweep script, enhancing the script, and utilizing a one-liner loop for nmap scans, executing eight processes and detecting open ports, notably port 80, on specific ip addresses.', 'chapters': [{'end': 5796.696, 'start': 5403.901, 'title': 'Narrowing down results in scripting', 'summary': 'Covers how to narrow down ping results to extract specific ip addresses by using commands like ping, cat, grep, cut, and tr, as well as writing a basic script for ip sweep.', 'duration': 392.795, 'highlights': ['The chapter covers how to narrow down ping results to extract specific IP addresses.', 'The use of commands like ping, cat, grep, cut, and tr for narrowing down results is demonstrated.', 'The process of writing a basic script for IP sweep is explained.']}, {'end': 6012.576, 'start': 5797.857, 'title': 'Understanding ip sweep script', 'summary': 'Discusses the structure and functionality of an ip sweep script, detailing the use of loops and user input to facilitate pinging multiple ip addresses within a given range and network.', 'duration': 214.719, 'highlights': ['The script utilizes a for loop to iterate through a sequence of IP addresses from one to 254, allowing for efficient pinging of multiple IP addresses within the defined range.', 'The user input, represented by the dollar sign one, enables flexibility in specifying the target IP addresses, facilitating the execution of multiple ping sweeps for different networks or quick script writing.', 'The addition of an ampersand at the end of the script enables threading, allowing the process to ping multiple IP addresses simultaneously for improved efficiency.', "The script's functionality includes specifying the first three octets of the home network, providing options for user input or hard-coding for simplicity and versatility."]}, {'end': 6241.666, 'start': 6013.236, 'title': 'Ip sweep script enhancement', 'summary': "Demonstrates how to use and improve an ip sweep script to gather ip addresses in a network, including adding conditional statements and error handling, referencing a specific script and acknowledging the original author's contribution.", 'duration': 228.43, 'highlights': ['The chapter demonstrates how to use and improve an IP sweep script to gather IP addresses in a network, including adding conditional statements and error handling.', 'The speaker references a specific script, ipsweep.sh, and provides examples of how to use it to gather information.', 'The speaker acknowledges the original author, Georgia Wideman, for the script and highlights its ease of learning and teaching.']}, {'end': 6445.898, 'start': 6241.686, 'title': 'Nmap scripting for ip list', 'summary': 'Demonstrates how to use a one-liner loop to perform nmap scans on a list of ip addresses, resulting in the execution of eight processes and detection of open ports, notably port 80, on specific ip addresses, with the option to stop the processes using control c or enter.', 'duration': 204.212, 'highlights': ['A one-liner loop is used to run Nmap scans on a list of IP addresses, executing eight processes and detecting open ports, notably port 80, on specific IP addresses.', 'The chapter explains the process of using a for loop to iterate through an IP list and perform Nmap scans on the listed IP addresses.', 'It also mentions the option to stop the processes using Control C or Enter once the scans are completed.']}], 'duration': 1041.997, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/lZAoFs75_cs/pics/lZAoFs75_cs5403901.jpg', 'highlights': ['A one-liner loop is used to run Nmap scans on a list of IP addresses, executing eight processes and detecting open ports, notably port 80, on specific IP addresses.', 'The script utilizes a for loop to iterate through a sequence of IP addresses from one to 254, allowing for efficient pinging of multiple IP addresses within the defined range.', 'The chapter covers how to narrow down ping results to extract specific IP addresses.', 'The chapter demonstrates how to use and improve an IP sweep script to gather IP addresses in a network, including adding conditional statements and error handling.']}, {'end': 7258.227, 'segs': [{'end': 6472.225, 'src': 'embed', 'start': 6446.158, 'weight': 2, 'content': [{'end': 6451.359, 'text': 'What we just did is we ran eight NMAP scans at one time instead of having to copy and paste these.', 'start': 6446.158, 'duration': 5.201}, {'end': 6454.08, 'text': "That's just a little bit of what scripting can do.", 'start': 6451.939, 'duration': 2.141}, {'end': 6463.142, 'text': 'It does get more advanced, but to be able to know a one-line for loop is really important if you go into penetration testing.', 'start': 6454.1, 'duration': 9.042}, {'end': 6468.524, 'text': "and it's just important in basic bash scripting as well.", 'start': 6464.202, 'duration': 4.322}, {'end': 6472.225, 'text': "so that's really it for this lesson and that's really it for this course.", 'start': 6468.524, 'duration': 3.701}], 'summary': 'Eight nmap scans run simultaneously, showcasing the power of scripting in penetration testing and basic bash scripting.', 'duration': 26.067, 'max_score': 6446.158, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/lZAoFs75_cs/pics/lZAoFs75_cs6446158.jpg'}, {'end': 6582.466, 'src': 'embed', 'start': 6554.57, 'weight': 3, 'content': [{'end': 6557.831, 'text': "I'm going to provide you a whole lot of different resources here.", 'start': 6554.57, 'duration': 3.261}, {'end': 6558.871, 'text': 'So take notes.', 'start': 6557.931, 'duration': 0.94}, {'end': 6564.153, 'text': 'These are some of the best resources I could think of for those wanting to get into the field.', 'start': 6559.512, 'duration': 4.641}, {'end': 6572.338, 'text': "I'll briefly cover each of them and then We'll leave you at it to do your own research and hopefully see you in the field someday as a pen tester.", 'start': 6564.593, 'duration': 7.745}, {'end': 6574.82, 'text': "So let's take a look at some of these resources.", 'start': 6573.039, 'duration': 1.781}, {'end': 6579.444, 'text': 'OK, so first resource is a shameless self-promotion.', 'start': 6575.301, 'duration': 4.143}, {'end': 6582.466, 'text': "And I only do this because I do think that I'm a valuable resource.", 'start': 6579.704, 'duration': 2.762}], 'summary': 'This transcript provides various resources for aspiring pen testers, including self-promotion.', 'duration': 27.896, 'max_score': 6554.57, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/lZAoFs75_cs/pics/lZAoFs75_cs6554570.jpg'}, {'end': 6680.345, 'src': 'heatmap', 'start': 6601.762, 'weight': 0.824, 'content': [{'end': 6607.246, 'text': "So, if you want to know what it's like to be an ethical hacker, if you're still not sure if this is the field for you,", 'start': 6601.762, 'duration': 5.484}, {'end': 6608.888, 'text': 'this might be a video for you to view.', 'start': 6607.246, 'duration': 1.642}, {'end': 6613.712, 'text': 'It talks about the day in and day out, stuff that you might do, what kind of assessment work.', 'start': 6608.908, 'duration': 4.804}, {'end': 6618.835, 'text': "you might be asked to do and what it's really like to be an ethical hacker.", 'start': 6614.352, 'duration': 4.483}, {'end': 6625.418, 'text': "On top of that, I've got another video on cyber career paths about penetration testing and ethical hacking.", 'start': 6619.455, 'duration': 5.963}, {'end': 6634.083, 'text': "So if you're looking to get into the field and you want to become a pen tester or ethical hacker and you're not quite sure where to go,", 'start': 6625.919, 'duration': 8.164}, {'end': 6635.965, 'text': 'this is probably the better video for you.', 'start': 6634.083, 'duration': 1.882}, {'end': 6643.329, 'text': "It kind of talks about all the knowledge that you'll need for a junior perspective and really the knowledge that you'll need to be successful in the field.", 'start': 6635.985, 'duration': 7.344}, {'end': 6646.07, 'text': 'including certifications, etc.', 'start': 6643.829, 'duration': 2.241}, {'end': 6652.172, 'text': "so if you're watching this video as an additional resource, this would probably be additional resource.", 'start': 6646.07, 'duration': 6.102}, {'end': 6655.093, 'text': 'um, part two is a good way to call it.', 'start': 6652.172, 'duration': 2.921}, {'end': 6658.695, 'text': 'this is the one like really detailed on penetration testing and ethical hacking.', 'start': 6655.093, 'duration': 3.602}, {'end': 6662.846, 'text': "On top of that, over here I've got playlists.", 'start': 6659.722, 'duration': 3.124}, {'end': 6665.329, 'text': "So if you come into the playlist, I've got a few courses.", 'start': 6663.006, 'duration': 2.323}, {'end': 6669.534, 'text': 'Most importantly is our zero to hero course.', 'start': 6666.49, 'duration': 3.044}, {'end': 6676.522, 'text': 'So if we come to the cybermentor.com and you go to courses over here and you go to zero, to hero pen testing,', 'start': 6670.074, 'duration': 6.448}, {'end': 6680.345, 'text': 'You can find more information on the syllabus.', 'start': 6677.923, 'duration': 2.422}], 'summary': 'Video provides insights into ethical hacking and penetration testing, offering guidance on necessary knowledge and certifications.', 'duration': 78.583, 'max_score': 6601.762, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/lZAoFs75_cs/pics/lZAoFs75_cs6601762.jpg'}, {'end': 6769.963, 'src': 'embed', 'start': 6742.185, 'weight': 5, 'content': [{'end': 6746.349, 'text': 'So leaving the shameless self-promotion, let me talk about some more cheap alternatives.', 'start': 6742.185, 'duration': 4.164}, {'end': 6750.634, 'text': "Hack the Box is a great, great alternative if you're just getting started.", 'start': 6747.31, 'duration': 3.324}, {'end': 6757.1, 'text': "So for Hack the Box, what it is is it's a series of vulnerable machines.", 'start': 6751.114, 'duration': 5.986}, {'end': 6759.603, 'text': 'So you could think of it almost like a game.', 'start': 6757.581, 'duration': 2.022}, {'end': 6764.188, 'text': 'So if you want to do some hacking, this is a great place to just start practicing and learning the ropes.', 'start': 6760.083, 'duration': 4.105}, {'end': 6769.963, 'text': 'What we can do is, say we could pick something on the easy side.', 'start': 6766.638, 'duration': 3.325}], 'summary': 'Hack the box offers a series of vulnerable machines for practicing hacking skills, ideal for beginners.', 'duration': 27.778, 'max_score': 6742.185, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/lZAoFs75_cs/pics/lZAoFs75_cs6742185.jpg'}, {'end': 6911.193, 'src': 'embed', 'start': 6885.633, 'weight': 0, 'content': [{'end': 6891.217, 'text': 'You think maybe you could use a little bit more handholding and you like a certification to come behind it.', 'start': 6885.633, 'duration': 5.584}, {'end': 6899.424, 'text': "I'm gonna show you the top three in my order that I think for pen testing, at least at a beginner to mid tier level, what the top three are.", 'start': 6891.898, 'duration': 7.526}, {'end': 6902.707, 'text': 'So eLearn Security gets number one slot in my mind.', 'start': 6899.544, 'duration': 3.163}, {'end': 6911.193, 'text': "If you come into here and you go on to certifications, So they've got a couple of different ones, the ECPPT or actually let's go to courses.", 'start': 6903.307, 'duration': 7.886}], 'summary': "Top three pen testing certifications: 1. elearn security's ecppt", 'duration': 25.56, 'max_score': 6885.633, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/lZAoFs75_cs/pics/lZAoFs75_cs6885633.jpg'}, {'end': 7138.228, 'src': 'embed', 'start': 7088.646, 'weight': 1, 'content': [{'end': 7091.728, 'text': "um, by itself, it's seventeen hundred dollars.", 'start': 7088.646, 'duration': 3.082}, {'end': 7094.441, 'text': 'It is by sans, right?', 'start': 7092.859, 'duration': 1.582}, {'end': 7096.223, 'text': 'So this is showing, GIAC.', 'start': 7094.561, 'duration': 1.662}, {'end': 7099.567, 'text': 'You actually have to take the corresponding sans course that goes with it.', 'start': 7096.243, 'duration': 3.324}, {'end': 7103.131, 'text': 'Um, and that course is upwards of $6, 000.', 'start': 7100.488, 'duration': 2.643}, {'end': 7113.643, 'text': 'So, unless you can get a employer to pay for this sand certification probably not the best, but the thing that I like about sans is that, uh,', 'start': 7103.131, 'duration': 10.512}, {'end': 7115.085, 'text': 'It stays up to date.', 'start': 7114.084, 'duration': 1.001}, {'end': 7120.071, 'text': 'They are constantly updating their courses and that they look good on a resume.', 'start': 7115.205, 'duration': 4.866}, {'end': 7123.816, 'text': "It's one of those really high tier, high level certifications.", 'start': 7120.512, 'duration': 3.304}, {'end': 7127.46, 'text': 'And the exam from what I hear is actually pretty good.', 'start': 7125.037, 'duration': 2.423}, {'end': 7130.684, 'text': "It's not a practical exam, but it's a fairly good exam.", 'start': 7127.52, 'duration': 3.164}, {'end': 7134.687, 'text': "And the nice thing I didn't mention, eLearn Security is also practical.", 'start': 7131.585, 'duration': 3.102}, {'end': 7136.367, 'text': 'So this OSCP is practical.', 'start': 7134.747, 'duration': 1.62}, {'end': 7138.228, 'text': 'The eLearn Security exam is practical.', 'start': 7136.407, 'duration': 1.821}], 'summary': 'Sans certification costs $6,000, offers high-level recognition, and updates courses regularly.', 'duration': 49.582, 'max_score': 7088.646, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/lZAoFs75_cs/pics/lZAoFs75_cs7088646.jpg'}, {'end': 7253.565, 'src': 'heatmap', 'start': 7181.532, 'weight': 0.795, 'content': [{'end': 7190.119, 'text': 'If you just Google, like honestly, if we go in here and we say like apocalypse here, if you say that and you Google that with write up,', 'start': 7181.532, 'duration': 8.587}, {'end': 7191.4, 'text': "you're going to find the write up for this.", 'start': 7190.119, 'duration': 1.281}, {'end': 7195.703, 'text': "you'll find a video for this or some kind of walkthrough, right.", 'start': 7192.06, 'duration': 3.643}, {'end': 7207.33, 'text': 'so you just want to look through these and try to try it on your own and then go back and then watch the write-up and see how you could have improved if you got through it or where you can improve an enumeration or whatever.', 'start': 7195.703, 'duration': 11.627}, {'end': 7212.374, 'text': 'is you need to uh to get better to actually succeed the next time you try attacking these machines?', 'start': 7207.33, 'duration': 5.044}, {'end': 7214.749, 'text': 'So that is it.', 'start': 7213.809, 'duration': 0.94}, {'end': 7218.911, 'text': 'You have reached the end of this course and the end of the bonus material.', 'start': 7215.31, 'duration': 3.601}, {'end': 7224.354, 'text': 'If you need anything, I provided my contact info again in the beginning.', 'start': 7219.612, 'duration': 4.742}, {'end': 7226.695, 'text': "I'm at the Cyber Mentor on Twitter.", 'start': 7224.434, 'duration': 2.261}, {'end': 7229.116, 'text': 'You can reach me on YouTube as well.', 'start': 7226.775, 'duration': 2.341}, {'end': 7232.357, 'text': 'And I really do thank you for joining me.', 'start': 7229.976, 'duration': 2.381}, {'end': 7237.079, 'text': 'I look forward to seeing many of you take the next step from this Linux.', 'start': 7232.457, 'duration': 4.622}, {'end': 7240.48, 'text': "If you made it this far, you've already gotten through the beginner Linux, and that's awesome.", 'start': 7237.119, 'duration': 3.361}, {'end': 7246.562, 'text': 'I hope you take this next step and that you are intrigued by penetration testing because we need more people in the field.', 'start': 7240.54, 'duration': 6.022}, {'end': 7253.565, 'text': "So I look forward to seeing you guys and girls come through and hopefully I'll work with some of you someday.", 'start': 7247.003, 'duration': 6.562}], 'summary': 'Encourages learners to improve by practicing, provides contact info, and urges to pursue penetration testing for more professionals in the field.', 'duration': 72.033, 'max_score': 7181.532, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/lZAoFs75_cs/pics/lZAoFs75_cs7181532.jpg'}], 'start': 6446.158, 'title': 'Nmap scans and certifications', 'summary': 'Explores scripting for nmap scans, offering practical examples and resources for penetration testers, and discusses top penetration testing certifications, including their content, cost, and industry relevance, as well as free learning resources.', 'chapters': [{'end': 6885.293, 'start': 6446.158, 'title': 'Scripting for nmap scans', 'summary': 'Discusses the value of scripting for nmap scans, providing a practical example and resources for aspiring penetration testers, along with self-promotion and alternative platforms for practice.', 'duration': 439.135, 'highlights': ['The chapter provides a practical example of running eight NMAP scans at one time using scripting, emphasizing its importance in penetration testing.', "Various resources for aspiring penetration testers are recommended, including a free course on ethical hacking, playlist, and the 'zero to hero' pen testing course.", 'Alternative platforms for practice, such as Hack the Box, Virtual Hacking Labs, and Volume Hub, are presented as valuable options for learning and honing hacking skills.']}, {'end': 7258.227, 'start': 6885.633, 'title': 'Top penetration testing certifications', 'summary': 'Discusses the top three penetration testing certifications: elearn security, oscp, and gpen, highlighting their content, cost, and relevance in the industry, and also emphasizes the availability of free resources for learning.', 'duration': 372.594, 'highlights': ['eLearn Security offers the top certification for penetration testing, with courses tailored for beginners and professionals, covering a wide range of topics such as programming, assembly language, buffer overflows, network pen testing, PowerShell, Linux, web app, Wi-Fi, and more.', 'OSCP is widely recognized and sought after, with a practical exam and a lab environment for hands-on experience, making it one of the most difficult yet esteemed certifications in the industry.', 'GPEN, offered by SANS, is a high-level certification, requiring the corresponding SANS course, making it an expensive option but known for staying up to date and holding high value on a resume.', 'Free resources such as YouTube channels, zero to hero courses, and platforms like Hack the Box are recommended for learning and practice, emphasizing the availability of valuable learning material without significant financial investment.']}], 'duration': 812.069, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/lZAoFs75_cs/pics/lZAoFs75_cs6446158.jpg', 'highlights': ['eLearn Security offers top certification for penetration testing, covering a wide range of topics.', 'OSCP is widely recognized and sought after, with a practical exam and a lab environment.', 'The chapter provides a practical example of running eight NMAP scans at one time using scripting.', 'Various resources for aspiring penetration testers are recommended, including free courses and platforms.', 'GPEN, offered by SANS, is a high-level certification known for staying up to date and holding high value.', 'Alternative platforms for practice, such as Hack the Box, Virtual Hacking Labs, and Volume Hub, are presented as valuable options.', 'Free resources like YouTube channels and platforms like Hack the Box are recommended for learning and practice.']}], 'highlights': ["Heath Adams introduces 'Linux for Ethical Hackers' course, relevant for ethical hacking or penetration testing.", 'The course is 95% hands-on and focuses on Kali Linux for ethical hacking.', 'Kali Linux offers a comprehensive set of tools for information gathering, wireless assessment, and various attacks, providing a wide range of capabilities for pen testers.', 'Understanding file permissions is crucial in penetration testing as it helps identify folders with full read-write access, essential for uploading and executing exploits, and finding configurations that can lead to root access.', 'The significance of Linux experience and a strong network foundation before diving into penetration testing, as most pen testing is done in Linux.', 'A one-liner loop is used to run Nmap scans on a list of IP addresses, executing eight processes and detecting open ports, notably port 80, on specific IP addresses.', 'eLearn Security offers top certification for penetration testing, covering a wide range of topics.', 'OSCP is widely recognized and sought after, with a practical exam and a lab environment.', 'The chapter provides a practical example of running eight NMAP scans at one time using scripting.', 'Various resources for aspiring penetration testers are recommended, including free courses and platforms.']}