Skip to main content

The Basic Commands Of Kali Linux The Best Commands

Ethical Hacking is Growing Like Nothing Else has Ever been, from the Last few Years.Everybody Today wants to be a Ethical Hacker mostly for Protecting them and Other People who they care About or for Getting Good Jobs in Great Companies.There are Many Institutes who Train People about Hacking.Most of the People think Hacking as Just click a Button and Hack Somebody,but this doesn't work like that. I Suppose Everybody has heard about Kali Linux as it the Heart and Sole of Hacking.I Said it because it comes Pre-installed with thousands of tools just for Ethical Hacking Purpose Only.So If you want to Learn Hacking Just Learn Kali.Kali Comes in CUI and GUI but mostly you have to type in the Commands in the Terminal,So you have Knowledge of the Commands.

Basic Commands of Kali Linux ::

1)alias : A way to run  Command or a series of  Commands using a Shorter Name than the usually associated Name with such Commands.

2)apt-get : This Command is usually used to update a Debian machine and to get and install Debian Programs.

3)cat : This Command can Read, Modify or Concatenate text files. This Command is mostly used for Displaying the Contents of a File.

4)cd : This Command is used to change the Current Directory in Linux and is used to Toggle Between Directories easily.

5)chmod : This Command is used to change the Access Mode (ie Permissions) of one or more files.

6)cmp : This Command is used to Compare two files of any type and also writes the Results to the Standard Output.

7)comm : This Command is used to Compare the Common lines in File1 and File2. The Output will be Shown in three columns which will be From from Left to right,lines Unique to file1, lines Unique to file2 and lines Common to both files.

8)cp : This Command is used to Copy files and Directories.

9)date : This Command sets a System's Date and Time. This is also a useful to Display Current Information when working in a Script file.

10)declare : This Command is used to Declares Variables, gives them Attributes or Modifies properties of Variables.

11)df : This Command is used to Display the amount of Disk Space available on the System containing each File name Argument. 

12)echo : This Command 
allows a User to Repeat, a string variable to standard output.

13)exitThis Command is used to Terminate a Script and can return a value to the Parent Script.

14)for : This command is used to Execute a Loop as long as certain conditions are met.

15)ifconfig : This Command is used to Configure Network Interfaces. 

16)less :This Command is used to Scroll through Configuration and Error Log Files, Displaying text files on screen at a time, with Backward or Forward moving Available in files.

17)lsThis Command is used to List Files and Directories within the Current Working Directory.

18)man : Man stands for "Manual" .Man allows a user to Format and Display the User Manual built into Linux distributions.

19)netstat : This Command provides Information and Statistics about Protocols in use and current TCP/IP Network Connections. It is also a helpful Forensic tool in figuring out which processes and programs are active on a computer and are involved in Network Communications.

20)nslookup : This Command allows a User to Enter a Host Name and find the Corresponding IP address. A Reverse of that process is used to find the Host name is also possible.

21)od : This Command is used to Dump Binary Files in octal (or hex/binary) format to Standard Output.

22)passwd : This Command Updates a user's authentication tokens (changes their Current Password).

23)ping : This Command allows a user to Verify that a particular IP address exists and can accept requests. Ping can be used to Test Connectivity and determine Response Time.

24)ps : This Command reports the status of Current Processes in a System.

25)pwdThis Command Stands for Print Working Directory. It displays the name of the Current Working Directory.

26)read : This Command is used to Read lines of text from Standard Input and to Assign Values of each field in the input line to shell variables for further processing.

27)shutdown : This command Turns off the Computer and can be combined with variables such as -h, for Halt after shutdown, or -r, for Reboot after Shutdown.

28)sort : This Command is used to Sort lines of Text Alphabetically or Numerically according to fields, Multiple Sort keys can also be used.

29)sudo : This Command allows a System Admin to give User the ability to Run Commands at the Root level.

30)tarThis Command provides the ability to Create Archives of specified files or to Extract Files from such an archive.

31)top : TOP is a set of Protocols for Networks that performs Distributed Information Processing and displays the Tasks on the system that take up the Most Memory.

32)traceroute : This Command Determines and Records a route through the Internet between two Computers and is useful for Troubleshooting Network/Router issues.

33)vmstat : This Command is used to get a Snapshot of everything in a system.

34)wc : This Command Counts the Number of Words, lines and characters in text files and produces a count for Multiple files if Several files are selected.

Don't Forget to Subscribe our YouTube Channel and like our Facebook Page.


Popular posts from this blog

How to hack Andriod using Stagefright Vulnerability

Today i am going to demonstrate a exploit to take reverse shell in android,before i explain the demo i want to explain some things related to  this hack or exploit and also this for education and awareness about security of your devices.
What is Stagefright?
Android includes Stagefright, a media playback engine at the native level that has built-in software-based codecs for popular media formats.

Stagefright audio and video playback features include integration with OpenMAX codecs, session management, time-synchronized rendering, transport control, and DRM.

Stagefright also supports integration with custom hardware codecs provided by you. To set a hardware path to encode 
and decode media, you must implement a hardware-based codec as an OpenMax IL (Integration Layer) component.  

How hacker can exploit this Stagefright Library?
This critical vulnerability was discovered by a researcher at Cyber Security Firm called Zimperium. This  vulnerability is a type of buffer overflow attack and in thi…

The Best way to Track your Facebook Login Location and Receive the Login Alerts

I think about One-Fourth of the total world population is on Facebook and Whatsapp. Facebook hacking has become common so we all should look towards our safety so that no one else could use our account for something doing illegal purposes and we should know that when our account was last logged in and from which location.

By the Way Facebook provides both the Features for your Safety and has a lot of many Additional Features.When someone or you log in into your account, facebook notify you by sending you a message at your Registered Phone Number and your registered Email-ID.It also has a feature that you can see at which place you were last logged in.

Follow the Below Steps to Track your Facebook Login Location ::

1)First of all open up a browser and log in into your Facebook account.
2)At the Right most End below the Address Bar there will be a Down Arrow.Click on that arrow.
3)Now click on the Settings Option.Then Click on Security below the General option.
4)Now click on the Edit button …

How to Transfer Your Android SmartPhone to PC from Wifi Wirelessly The Best Way

Everybody in today's World is on Internet and they have become very Modern and Work Smartly in their life and make full use of the Internet to do their work more efficiently and Simply.
If you have a Android Smart Phone,What would you do if you want to see your mobile stuff on your Windows ?Buy a Card Reader or use a Data Cable or use Shareit or something like that to transfer your Data to your Windows and Then Access it.
I got a Better and Of course a Smart Way to do this with a help of a Simple app called Airdroid.And I bet you that It will the Best Android App you have ever seen.

Follow the Below Steps to Transfer your Android Phone to PC ::

1)Download the Airdroid App from PlayStore and install it.
2)Open the App and first Sign Up.You can Sign up using Google+,Facebook or Twitter also.
3)A small Window will appear asking for View all App and System Notifications on the Computer in real time.Click on the Enable Button.
4)Then your Mobile Accessibility Settings will be open.Under the S…