Alright yes! yes! yes!
The last time we go together I introduced you to the Linux terminal and how to find help using any Linux command.
Today we're going to investigate the top Linux commands you'll need to know for the SY0-501 exam.
Let's start with PING.
Using PING in Linux isn't all that different from using PING in Windows. But there are a few notable differences which we should get into.
The unique thing about PING in Linux is that it never stops until you explicitly tell it to stop.
So when I type:
My Linux box will continuously ping the target until I press Ctrl + c
There's a nice little trick to get around that though:
ping 10.1.30.16 -c 10
Using the "-c" command line switch I'm able to limit my pings to a count of exactly 10.
You can also specify the amount of time your Linux box should wait before sending the next PING packet (also known as an ICMP echo request).
Yes! Now it's time to have some fun with Linux.
Today we're going to introduce to the world's most popular penetration testing and ethical hacking Linux distribution: Kali Linux. (pronounced "CAL - LEE")
Kali is the standard beloved by both white-hat hackers and evil attackers alike. It offers a complete suite of attack tools that a competent hacker can use to attack and compromise systems and networks.
Today we're going to start things off with a basic introduction to the Linux terminal. You'll learn:
Are you ready to jump in? Let's do this baby!
Every cybersecurity professional needs to know how to navigate around the operating system from the command...
Welcome back. This is the last post in our seven part series on setting up our Security+ Pro hacking lab. Here's what we covered so far:
Each post has a detailed step-by-step walk through with tons of screenshots and a step-by-step video to help you along the way:
Now today I want to show you how to enable file sharing between your Kali Linux VM and your host; this is, your physical computer.
There are two techniques for doing this. Both are pretty easy but it took me a long time to figure this out for some reason.
The first step is to enable file sharing.
What's up baby - so this is part four of our seven part series which walks you through creating your own Security+ hacking lab (so you can pass the test with confidence).
We've already covered how to setup VMWare Workstation and how to download and install Kali Linux. Now I'm going to show you how to personalize Kali Linux which will make it way more fun to use.
Here's the rundown:
We are midway through our training session on configuring our hacking lab for the Security+ exam.
We are going to do five things in this training lesson:
Pop in your first name and best email address and we'll send you:
The latest updates on the CompTIA Security+ SY0-501 exam
Proven tips and tricks for passing the exam
Hands on video labs with complete step-by-step walk-throughs
And don't forget to refresh your inbox. You should see us there in about 3 minutes.