Ethical hacker Udemy course commands

HackingSkills
2 min readDec 7, 2020

--

  1. sudo →to run the command as an administrator, but we should enter the password.
  2. sudo apt install -y kali-grant-root && sudo dpkg-reconfigure kali-grant-root. Then select “Enable password-less privilege escalation” → to use sudo to run the command as an administrator, but without entering the password.
  3. sudo su →to use the terminal as administrator user, and not use sudo every time.
  4. cd → to navigate between the directories.
  5. cd .. → to go back to the previous directory.
  6. passwd → to change the password of the user.
  7. ls →to list all directories and files in the current directory.
  8. pwd →to view the current directory.
  9. mkdir →to create a new directory.
  10. rmdir →to delete a directory.
  11. updatedb →to create internal database in the system.
  12. locate → to search for a file in the system.
  13. man →to view description for a command.
  14. - -help →to view description for a command.
  15. cat →to create a new file and write in it.
  16. nano →to open a file with editor.
  17. grep →to search for words in a file and display the line.
  18. less → to open a large file by bits.
  19. ifconfing → to view the settings of the network.
  20. clear → to clean the terminal window.
  21. uname -a → to view kali version.
  22. service ssh start → to start ssh.
  23. service ssh stop→ to stop ssh.
  24. netstat -antp| grep ssh → to check if the ssh started or not.
  25. service apache2 start → to start html .
  26. service apache2 stop→ to stop html .
  27. netstat -antp| grep apache2→ to check if the html started or not.
  28. apt-get install “service” → to install the service.
  29. apt-get remove “service” → to remove the service.
  30. update-rc.d “service” enable →to start the service once the operating system runs and stop once the operating systems stops.
  31. update-rc.d “service” disable →to stop the above service.

Created 8 December 2020

  1. ssh → used to connect to a computer remotely and send encrypted data.

--

--