1 00:00:00,060 --> 00:00:00,840 Welcome back, everyone. 2 00:00:00,870 --> 00:00:08,530 This is news now I'm asking you one of the most powerful gadgets being in Hacker. 3 00:00:09,240 --> 00:00:10,770 It's really, really important. 4 00:00:11,010 --> 00:00:12,660 OK, and let's get started. 5 00:00:13,440 --> 00:00:14,690 That's callisthenics. 6 00:00:14,750 --> 00:00:17,870 OK, I hope you have heard about it. 7 00:00:18,330 --> 00:00:19,410 If not, that's OK. 8 00:00:19,440 --> 00:00:23,680 I will get to it very much from step by step. 9 00:00:23,740 --> 00:00:30,040 OK, we get to know about how to manage basic set up a bit more about the Linux as well. 10 00:00:30,060 --> 00:00:35,250 You will also be learning about the Linux command as well, which will be very, very important for 11 00:00:35,250 --> 00:00:38,730 you to perform some utility activity with it. 12 00:00:38,820 --> 00:00:39,220 All right. 13 00:00:39,780 --> 00:00:46,470 So understand this Linux calling UNIX is one of the distribution, one of the distribution of Linux 14 00:00:46,470 --> 00:00:47,040 platform. 15 00:00:47,190 --> 00:00:52,710 Linux has got to block to very and basically one of them is the Damián. 16 00:00:52,920 --> 00:00:56,220 And this is the part of the Linux. 17 00:00:56,700 --> 00:01:03,330 Now, when you say, OK, if it is really the Linux, why do we you know, if it is a Linux, why don't 18 00:01:03,330 --> 00:01:10,680 we directly, you know, do all the activity on our, you know, Ubuntu itself, Ubuntu Linux or maybe 19 00:01:10,680 --> 00:01:11,490 the Microsoft Word. 20 00:01:11,500 --> 00:01:15,360 So Microsoft then maybe why don't we make use of that? 21 00:01:15,360 --> 00:01:17,280 Or why don't we make use of MapQuest? 22 00:01:17,640 --> 00:01:21,930 See, every operating system has been built with a specific purpose. 23 00:01:22,200 --> 00:01:26,240 McCoist has been built for productivity, maybe for simplicity. 24 00:01:26,380 --> 00:01:34,320 Windows 10 is again built for the same purpose, for productivity, simplicity and more and more you 25 00:01:34,320 --> 00:01:35,870 can explore a bit. 26 00:01:35,880 --> 00:01:38,940 You can you can be much more flexible at the same time. 27 00:01:39,300 --> 00:01:43,860 But MacBook, you'll find more concern about privacy and security. 28 00:01:43,860 --> 00:01:47,310 That's why you won't be able to install anything by your choice. 29 00:01:47,610 --> 00:01:54,660 Now, although all the Windows 10 has been improved a lot, so you would find similar kind of privacy 30 00:01:54,660 --> 00:01:59,400 and security, you know, recommendation on Windows Denisova. 31 00:01:59,790 --> 00:02:06,750 But when you look at the penetration testing or hacking platform, the ethical hackers basically need 32 00:02:06,750 --> 00:02:14,460 a platform which is very much secure and also those which are already built up, but many of the required 33 00:02:14,460 --> 00:02:14,900 tools. 34 00:02:15,270 --> 00:02:22,890 So if you look at the windows stand on maybe Macko system, if let's say I want to make use of beef 35 00:02:22,890 --> 00:02:28,650 to layer any any sort of, you know, other tool, better browser or any sort of stuff. 36 00:02:28,800 --> 00:02:31,710 So any any sort of tool as well. 37 00:02:32,070 --> 00:02:38,430 But Galili and basically it's already embedded all the hacking tools, all the required hacking, the 38 00:02:38,430 --> 00:02:40,450 most popular tools are already building. 39 00:02:40,830 --> 00:02:46,980 So that's why you will find it's predominantly been used for penetration testing and security already. 40 00:02:47,310 --> 00:02:53,760 Of course, for those who are not familiar with the penetration, testing is a part of the ethical hacking, 41 00:02:53,760 --> 00:02:54,780 just a generic name. 42 00:02:55,230 --> 00:03:01,830 Penetration testing is more professional would more professional activity, and it has a process in 43 00:03:01,830 --> 00:03:02,970 the organization as well. 44 00:03:03,420 --> 00:03:07,280 They're basically an engineer. 45 00:03:07,300 --> 00:03:15,390 Try exploiting the system, you know, and try exploiting the vulnerability or weaknesses of the target 46 00:03:15,390 --> 00:03:15,780 system. 47 00:03:15,780 --> 00:03:17,190 It could be a Web application. 48 00:03:17,190 --> 00:03:23,880 It could be routers, switches, network devices, or even humans, as it were, tried to exploit it. 49 00:03:23,880 --> 00:03:30,690 And then once it is exploited, then it will be a part of reporting that the system is hackable. 50 00:03:31,020 --> 00:03:33,690 Now, you better go ahead and try fixing it. 51 00:03:33,690 --> 00:03:38,550 Now, this report goes to the software developer of people who developed the system and they tried to 52 00:03:38,550 --> 00:03:39,180 rectify it. 53 00:03:39,390 --> 00:03:39,810 Right. 54 00:03:39,910 --> 00:03:43,890 That's that's the purpose of penetration testing and that's what they call hacking is. 55 00:03:44,970 --> 00:03:51,720 But in the organization, in the enterprises, ethical hacking is not the they prefer they make use. 56 00:03:51,780 --> 00:03:54,270 They prefer saying penetration testing. 57 00:03:54,390 --> 00:03:55,530 I hope you got the idea. 58 00:03:56,220 --> 00:04:02,520 Then, of course, with Caledonians, you get more than 600 penetration tools already in it. 59 00:04:02,520 --> 00:04:10,170 Just click away, just like you see with Windows 10 machine, the exit boards and all those Microsoft 60 00:04:10,170 --> 00:04:11,550 tools are already in. 61 00:04:11,550 --> 00:04:14,970 But the edge and all this stuff are already in. 62 00:04:14,970 --> 00:04:19,860 But you don't really have to go, you know, install any additional software for it. 63 00:04:19,920 --> 00:04:23,730 You already have a meal, probably outlook install on the system as well. 64 00:04:23,740 --> 00:04:26,660 Already similar thing happened with the MacBook. 65 00:04:26,660 --> 00:04:31,470 Yes, but you look at the AI movie, if you want to edit some movies on your system, it's already. 66 00:04:31,590 --> 00:04:35,930 But if you don't really have to download anything because it's made for the productivity. 67 00:04:36,300 --> 00:04:42,360 Similarly, callisthenics is made for hacking, ethical hacking, penetration testing, security auditing, 68 00:04:42,810 --> 00:04:45,510 digital for as far as all this stuff. 69 00:04:45,510 --> 00:04:45,720 Right. 70 00:04:46,440 --> 00:04:52,470 So that's why it's very much handy and it is prepared in a very secure environment as well. 71 00:04:52,470 --> 00:04:57,060 A wide range of wireless device support is already present. 72 00:04:57,060 --> 00:04:59,730 So there are many wireless. 73 00:05:00,460 --> 00:05:06,640 Softwares are able to do is aircraft engines, which is pretty much popular. 74 00:05:06,680 --> 00:05:13,690 This is pretty much popular in terms of penetrating the wireless network and we'll talk about it as 75 00:05:13,690 --> 00:05:14,140 we go ahead. 76 00:05:14,710 --> 00:05:16,910 And developing very much security, secure environment. 77 00:05:16,960 --> 00:05:22,240 And that's the reason why it is so much popular among the ethical hacking or hacking community, is 78 00:05:22,240 --> 00:05:28,030 that I hope you got the idea about the Taliban in the next step onwards will understand the solution 79 00:05:28,030 --> 00:05:32,300 of and some basic set up and Linux commands as well. 80 00:05:32,560 --> 00:05:33,340 So we'll see you then. 81 00:05:33,370 --> 00:05:33,820 Thank you.