(PDF) Common Kali Linux Commands Overview
(PDF) Common Kali Linux Commands Overview
(PDF) Common Kali Linux Commands Overview
(B)
bg Send to background
(C)
cal Display a calendar
cd Change Directory
(D)
date Display or change the date time
dc Desk Calculator
(E)
(F)
(G)
(H)
hash Remember the full pathname of a name argument
(I)
(J)
(K)
(L)
(M)
(N)
netstat Networking information
nice Set the priority of a command or job
(O)
op Operator access
(P)
ps Process status
pushd Save and then change the current directory
pwd Print Working Directory
(Q)
(R)
(T)
(v)
(w)
whereis Search the user's $path, man pages and source files for a
program
(x)
Some Exanples:
Command: ls
Th d “l ” t d f (Li t Di t C t t ) Li t th t t
The command “ls” stands for (List Directory Contents), List the contents
of the folder, be it file or folder, from which it runs. The most common
options are -a (all files) and -l (long or details) Tab completion is
supported and may be configured with .inputrc
When output to file the files are listed one per line. By default, colour is
not used to distinguish types of files. That is equivalent to using --
color=none. Using the --color option without the optional WHEN
argument is equivalent to using --color=always. With --color=auto, color
codes are output only if standard output is connected to a terminal (tty).
Command: lsblk
The “lsblk” stands for (List Block Devices), print block devices by their
assigned name (but not RAM) on the standard output in a tree-like
fashion.
he “lsblk -l” command list block devices in „list„ structure (not tree like
fashion).
Note: lsblk is very useful and easiest way to know the name of New Usb
Device you just plugged in, especially when you have to deal with
disk/blocks in terminal.
Command: sudo
he “sudo” (super user do) command allows a permitted user to execute a
command as the superuser or another user, as specified by the security
policy in the sudoers list.
exp: root@Kali:~# sudo add-apt-repository ppa:tualatrix/ppa
Command: mkdir
The “mkdir” (Make directory) command create a new directory with
name path. However is the directory already exists, it will return an error
message “cannot create folder, folder already exists”.
Command: chmod
The Linux “chmod” command stands for (change file mode bits). chmod
changes the file mode (permission) of each given file, folder, script, etc..
according to mode asked for.
Read (r)=4
Write(w)=2
Execute(x)=1
So if you want to give only read permission on a file it will be assigned a
value of „4„, for write permission only, a value of „2„ and for execute
permission only, a value of „1„ is to be given. For read and write
permission 4+2 = „6„ is to be given, ans so on.
Now permission need to be set for 3 kinds of user and usergroup. The
first is owner, then usergroup and finally world.
rwxr-x--x abc.sh
To change its permission and provide read, write and execute permission
to owner, group and world.
read, write and execute to owner and only execute to group and world.
Note: one of the most important command useful for sysadmin and user
both. On a multi-user environment or on a server, this command comes to
rescue, setting wrong permission will either makes a file inaccessible or
provide unauthorized access to someone.
Command: tar
Command: cp
The “copy” stands for (Copy), it copies a file from one location to another
location.
Command: mv
The “mv” command moves a file from one location to another location.
Command: pwd
root@Kali:~# pwd
/home/user/Desktop
Command: cd
Finally, the frequently used “cd” command stands for (change directory),
it change the working directory to execute, copy, move write, read, etc.
from terminal itself.
root@Kali:~# cd /home/user/Desktop
server@localhost:~$ pwd
/home/user/Desktop
https://www.researchgate.net/profile/Ameer_Sameer
https://www.linkedin.com/in/ameer-sameer-452693107
http://www.slideshare.net/AmeerSameer
http://facebook.com/ameer.Mee/
ResearchGate has not been able to resolve any citations for this publication.
Project
The main security objectives are to: - Protect the communication from the malicious users. - Enhance the CR System Security to
realize good & reasonable protection
View project
Project
Project
The main goal of this project is to design and simulate : Emotion Arabic News Recommender System
View project
Project
Project on DATA-MINING
Ameer Sameer
Security enhancement using algorithms like : Botnet detection Deep packet inspection Web-attack detection Web proxy log analysis
Algorithmic alert correlation Host based threat detection Intrusion ... [more]
View project
Project
Ameer Sameer
To provide a clear way of the project, we have enumerated a few project topics below. - Balancing Heuristic Scheme for Independent
Task Scheduling also in Cloud Computing - A Frame work for Misbeha ... [more]
View project
Article
January 2009
Johan Thelin
Read more
Article
Real-time Linux
E. Nisley
A report on the Fourth RT Linux Workshop is presented. The presentations ranged from academic studies to nuts-and-bolts
applications with liberal seasoning of kernel internals and business practicalities. The various distributions surround that common
kernel with whatever collection of programs they deem appropriate.
Read more
Article
An Embedded USB Controller Linux Device Driver: Common Practices and Experience
Dimitris Lampridis
Read more
Last Updated: 05 Jul 2022