1 00:00:01,310 --> 00:00:01,780 All right. 2 00:00:01,820 --> 00:00:08,570 We've got Kelly Linux installed were successfully logged in and now we're going to learn some Linux 3 00:00:08,930 --> 00:00:11,570 before we get started with learning Linux. 4 00:00:11,570 --> 00:00:18,050 Let's take a brief minute or two to actually just look at clinics and what it has to offer and also 5 00:00:18,050 --> 00:00:23,080 see why it is the go to distribution when it comes to pen testing. 6 00:00:23,090 --> 00:00:31,350 So here we have our screen and you could see from the sidebar here that there are some favorites. 7 00:00:31,400 --> 00:00:38,750 Now you can use Linux like a gooey so graphical user interface basically meaning that we can just point 8 00:00:38,750 --> 00:00:42,800 and click on something like this folder here we'll bring it files. 9 00:00:42,800 --> 00:00:46,370 Now these files look similar if you're a Linux user or a Mac user. 10 00:00:46,370 --> 00:00:49,270 This is just a goofy way of accessing files. 11 00:00:49,280 --> 00:00:49,580 Right. 12 00:00:49,580 --> 00:00:53,640 So we can go into documents or downloads or however we want to do it. 13 00:00:53,750 --> 00:00:57,890 We've got access to our folder in our files right here on the left side. 14 00:00:58,310 --> 00:01:04,100 We've also got this Firefox now Firefox used to be ISOs all so you can see like a little bit of a weasel 15 00:01:04,100 --> 00:01:05,020 in here. 16 00:01:05,330 --> 00:01:11,540 But now it is known as Firefox and this is our web browser and we also have this thing called the terminal. 17 00:01:11,540 --> 00:01:16,130 We're gonna be very intimate with the terminal here starting in the next video. 18 00:01:16,160 --> 00:01:22,940 So the terminal is a way to utilize accessing everything that we have here including these folders and 19 00:01:22,950 --> 00:01:27,870 these files without ever using a graphical interface to do so. 20 00:01:27,890 --> 00:01:33,410 So we'll learn a lot about the terminal and why it's so powerful and how to utilize it in our day to 21 00:01:33,410 --> 00:01:34,870 day pen testing. 22 00:01:35,060 --> 00:01:41,120 And we have some other tools here as well we've got a little text editor or a notepad we've got Metis 23 00:01:41,120 --> 00:01:46,490 flight which is a framework we're going to become very familiar with with pen testing throughout this 24 00:01:46,490 --> 00:01:47,420 course. 25 00:01:47,570 --> 00:01:50,030 We've got brb sleep which I promise we'll use as well. 26 00:01:50,030 --> 00:01:53,490 That's more geared towards web application penetration testing. 27 00:01:53,600 --> 00:02:00,170 We've got Xen map which is also the graphical version of a tool called n map that's for network scanning 28 00:02:00,170 --> 00:02:02,000 we'll get into that as well. 29 00:02:02,000 --> 00:02:05,350 And we've got this wonderful tool here called cherry tree. 30 00:02:05,360 --> 00:02:08,780 Now we have covered keep no and we've covered green shot. 31 00:02:08,780 --> 00:02:11,120 This is a another option. 32 00:02:11,120 --> 00:02:16,430 I told you guys that we're going to be looking at Cherry Tree and we install Linux here it is. 33 00:02:16,430 --> 00:02:17,990 So you can just. 34 00:02:18,070 --> 00:02:25,310 Or you could set up nodes here would you say cast and now you can take your nodes or take some notes 35 00:02:25,790 --> 00:02:31,310 and then you can add additional nodes on top of that test too. 36 00:02:31,340 --> 00:02:35,560 And now you have a baby node here or a child node or whatever you want to call it. 37 00:02:35,570 --> 00:02:42,200 So this is very nice for keeping a good notebook especially if you want the inside of your virtual machine. 38 00:02:42,200 --> 00:02:47,750 The only advice against this that I have is that keeping your notebook inside your virtual machine if 39 00:02:47,750 --> 00:02:52,150 your virtual machine crashes or you don't have a backup of it you lose all of your notes. 40 00:02:52,160 --> 00:02:56,610 So me preferably I like to keep my notes outside of my VM. 41 00:02:56,690 --> 00:03:00,300 However I do know a lot of people that keep their notes inside their VM. 42 00:03:00,320 --> 00:03:06,770 Here's a really really easy way to do it with cherry tree is very point and click and you can actually 43 00:03:06,770 --> 00:03:10,850 just import screenshots pretty easily as well into here. 44 00:03:10,850 --> 00:03:15,380 So another option instead of keep note is cherry tree. 45 00:03:15,380 --> 00:03:17,030 And it works really really well. 46 00:03:17,060 --> 00:03:24,860 So again very important to keep notes and I do like that offensive security has put the cherry tree 47 00:03:24,860 --> 00:03:28,040 on the favorites panel for this version of Cal Linux. 48 00:03:28,040 --> 00:03:29,030 So I'm going to close this out. 49 00:03:29,040 --> 00:03:30,760 Am I going to say that. 50 00:03:30,770 --> 00:03:38,000 Couple of things to point out so we can hit this little bar here to show all of our applications and 51 00:03:38,060 --> 00:03:42,260 you could see all the applications that we have installed could scroll through and there's quite a bit 52 00:03:42,860 --> 00:03:47,400 but a better way to actually look at this is to go ahead and just hit escape. 53 00:03:47,630 --> 00:03:54,110 And if we go up to applications you at the top we could see that everything is put together in phases. 54 00:03:54,110 --> 00:04:00,740 So we're going to talk about the phases of ethical hacking and for example step one is information gathering. 55 00:04:00,740 --> 00:04:07,130 So they've got some tools here for information gathering related to related to it. 56 00:04:07,160 --> 00:04:07,460 Right. 57 00:04:07,460 --> 00:04:09,530 So all these nice tools. 58 00:04:09,530 --> 00:04:13,430 But let's say that we wanted to do we want to do reporting. 59 00:04:13,430 --> 00:04:16,010 Well they have got some reporting tools down here. 60 00:04:16,130 --> 00:04:20,610 They've got social engineering tools forensics reverse engineering wireless attacks. 61 00:04:20,690 --> 00:04:26,870 So basically they have all kinds of built in tools here for penetration testing and that is what makes 62 00:04:26,870 --> 00:04:29,420 this a penetration testing distribution. 63 00:04:29,450 --> 00:04:31,230 That's what makes this so awesome. 64 00:04:31,310 --> 00:04:39,670 So all these favorites here comes power load ahead with so many different tools so catalytic source 65 00:04:39,670 --> 00:04:40,220 them. 66 00:04:40,280 --> 00:04:43,460 The other off option out there is called Parrot. 67 00:04:43,460 --> 00:04:47,750 You might hear a lot of people talk about parrot parrot is up and coming. 68 00:04:47,750 --> 00:04:48,800 I've used it a bit. 69 00:04:48,800 --> 00:04:49,670 I do not like it. 70 00:04:49,670 --> 00:04:51,530 I've had some performance issues with it. 71 00:04:51,590 --> 00:04:58,000 So my preference is to go to is Kelly Linux but both offer a lot of the same features. 72 00:04:58,010 --> 00:05:03,310 So from here what we're gonna go ahead and do is we're going to now open up a terminal and we're going 73 00:05:03,310 --> 00:05:11,170 to maximize it and we are just going to take some time and actually get familiar with this command line. 74 00:05:11,200 --> 00:05:17,300 So I will catch you in the next video when we started to actually learn how to navigate the file system 75 00:05:17,690 --> 00:05:20,170 and utilize Linux to our advantage.