1 00:00:01,380 --> 00:00:09,420 In this lecture I will give a brief introduction about Linux so clearly Unix is an advanced penetration 2 00:00:09,420 --> 00:00:16,590 distinctly an X distribution used for penetration testing ethical hacking and network security assessments 3 00:00:18,230 --> 00:00:26,010 and penetration testing is the practice of safely testing a computer system network or with application 4 00:00:26,220 --> 00:00:34,920 to find vulnerabilities that an attacker could exploit and black hat hackers use the same tools in Kelly 5 00:00:34,920 --> 00:00:43,530 Linux but we as deep into stars or white hat hackers will use them safely and with authorization from 6 00:00:43,530 --> 00:00:46,620 the organization we conduct testing for. 7 00:00:47,340 --> 00:00:57,600 So knowing how to use these tools included in telling Linux will be very useful for us as security analysts 8 00:00:58,700 --> 00:01:06,740 the terms ethical hacking and penetration testing are often used interchangeably but still hacking. 9 00:01:06,740 --> 00:01:14,600 On the other hand is a more general term that includes all hacking methods and other related cyber attack 10 00:01:14,780 --> 00:01:15,820 methods. 11 00:01:16,040 --> 00:01:23,870 So it requires wider knowledge and more work than testing which is more focused on a specific area of 12 00:01:23,870 --> 00:01:25,290 interest. 13 00:01:25,460 --> 00:01:33,770 So the main goal here is to identify the abilities implement countermeasures and test if that work. 14 00:01:33,950 --> 00:01:39,470 And since these kids have been testing and if you can hacking are for Red Team security professionals 15 00:01:39,950 --> 00:01:47,720 while the senior cyber certification is blue team security certification that focuses on security analysis 16 00:01:47,990 --> 00:01:56,740 and incident response rather than testing then we will not take a deep look into Linux and its tools. 17 00:01:56,750 --> 00:02:04,610 However knowing the basics and the main ideas is very useful for you as a security analyst so that you 18 00:02:04,610 --> 00:02:13,080 can understand attacks in production and simulate them in your labs and we have hundreds of tools in 19 00:02:13,080 --> 00:02:21,830 Kelly Linux that are organized into categories information gathering where we have tools such as multiple 20 00:02:22,320 --> 00:02:26,240 in map and then map vulnerability analysis. 21 00:02:26,300 --> 00:02:34,610 And here we have tools such as Nick tool and again in map password attacks using John the rebar of crack 22 00:02:34,910 --> 00:02:43,910 and other tools wireless attacks which include tools such as aircraft easy exploitation tools such as 23 00:02:44,090 --> 00:02:48,030 Armitage might exploit and skew the map. 24 00:02:48,060 --> 00:02:55,950 How do we have web application releases database assessment and other categories and in the next picture 25 00:02:56,160 --> 00:03:04,100 we will explore how to work with two tools that are very useful and very popular might exploit and in 26 00:03:04,140 --> 00:03:04,430 map. 27 00:03:05,250 --> 00:03:10,050 So in this lecture I have given a brief introduction about Kelly Linux.