Sunday, 15 December 2024

📘 Kali Linux & Ethical Hacking - Student Command Guide with Expected Outputs - Beginner Program


🔐 Kali Linux & Ethical Hacking for College Students – 

In today’s digital world, cybersecurity skills are no longer optional—they are essential. This Kali Linux & Ethical Hacking program for college students is a beginner-friendly, hands-on course designed to build strong foundations in Linux, networking, and ethical hacking concepts using real-world tools and legal lab environments.

Through a structured 30-day learning path, students gain practical exposure to Linux commands, system administration, network scanning, vulnerability assessment, and cybersecurity best practices. The program emphasizes ethical awareness, cyber laws, and responsible hacking, preparing learners for internships, CTF challenges, and entry-level cybersecurity roles.

Ideal for engineering, science, IT, and management students, this course bridges the gap between academics and industry by focusing on skills, documentation, and career readiness.


🟢 WEEK 1: Linux Basics (Foundation Commands)


1️⃣ Check Current Location

pwd

Expected Output

/home/kali

Student Learns:
→ You are currently inside the kali user’s home directory.


2️⃣ List Files & Folders

ls

Expected Output

Desktop Documents Downloads Music Pictures Videos
ls -l

Expected Output

drwxr-xr-x 2 kali kali 4096 Documents

Learns:

  • d = directory

  • rwx = permissions


3️⃣ Change Directory

cd Documents pwd

Expected Output

/home/kali/Documents
cd .. pwd

Expected Output

/home/kali

4️⃣ Create Files & Folders

mkdir cyberlab cd cyberlab touch notes.txt ls

Expected Output

notes.txt

5️⃣ View File Content

cat notes.txt

Expected Output

(empty output)
echo "My first Linux note" >> notes.txt cat notes.txt

Expected Output

My first Linux note

6️⃣ Edit Files

nano notes.txt

Expected Result

  • Nano editor opens

  • Student edits text

  • Save: CTRL + O

  • Exit: CTRL + X


7️⃣ File Permissions

ls -l notes.txt

Expected Output

-rw-r--r-- 1 kali kali 23 notes.txt
chmod 700 notes.txt ls -l notes.txt

Expected Output

-rwx------ 1 kali kali 23 notes.txt

Learns:
Only owner can read/write/execute.


🟢 WEEK 2: System & Networking Commands


8️⃣ User Identity

whoami

Expected Output

kali
id

Expected Output

uid=1000(kali) gid=1000(kali)

9️⃣ Process Monitoring

ps

Expected Output

PID TTY TIME CMD
top

Expected Result

  • Live CPU & memory usage

  • Press q to exit


🔟 Disk & Memory

df -h

Expected Output

Filesystem Size Used Avail Use%
free -h

Expected Output

Mem: 7.6Gi 1.2Gi 5.8Gi

1️⃣1️⃣ Network Information

ip a

Expected Output

inet 192.168.56.101/24
ping google.com

Expected Output

64 bytes from google.com

(Stop with CTRL + C)


1️⃣2️⃣ Install Software

sudo apt install htop

Expected Output

Setting up htop...
htop

Expected Result

  • Interactive process viewer


1️⃣3️⃣ Services & SSH

systemctl status ssh

Expected Output

Active: active (running)
ssh localhost

Expected Result

  • Password prompt

  • Local SSH login


🟡 WEEK 3: Ethical Hacking Core Commands


1️⃣6️⃣ WHOIS Lookup

whois google.com

Expected Output

Registrant Organization: Google LLC

Learns:
Ownership & registration info


1️⃣7️⃣ DNS Lookup

nslookup google.com

Expected Output

Address: 142.250.xxx.xxx

1️⃣8️⃣ Nmap Scan (Safe Lab Only)

nmap 127.0.0.1

Expected Output

PORT STATE SERVICE 22/tcp open ssh
nmap -sV 127.0.0.1

Expected Output

OpenSSH 8.4

1️⃣9️⃣ Vulnerability Scan

nmap --script vuln 127.0.0.1

Expected Output

No vulnerabilities found

(This is GOOD – secure system)


2️⃣0️⃣ Metasploit Framework

msfconsole

Expected Output

msf6 >
help

Learns:
Framework structure, not exploitation


2️⃣1️⃣ Password Hash Demo

john --test

Expected Output

Benchmarking completed

🟠 WEEK 4: Scripting, Logs & Career Skills


2️⃣2️⃣ Bash Script Example

nano scan.sh

Script Content

#!/bin/bash echo "Scanning localhost" nmap 127.0.0.1
chmod +x scan.sh ./scan.sh

Expected Output

Scanning localhost PORT STATE SERVICE

2️⃣4️⃣ Log Analysis

ls /var/log

Expected Output

auth.log syslog kern.log
sudo cat /var/log/auth.log

Learns:
Login & security events


2️⃣5️⃣ Burp Suite

burpsuite

Expected Result

  • GUI opens

  • Intercept ON/OFF

  • Proxy awareness


2️⃣9️⃣ GitHub Basics

git init git add . git commit -m "My cybersecurity labs"

Expected Output

1 file changed

✅ Recommended (Modern Linux)

ip a

or

ip addr

Expected Output (Sample)

inet 192.168.56.101/24

👉 Shows IP address, subnet, interfaces


⚠️ Older (Still Works in Kali)

ifconfig

(May require net-tools)

sudo apt install net-tools

🔁 Windows ↔ Linux Command Equivalents (Must-Know)

📡 Networking Commands

Windows CommandLinux EquivalentPurpose
ipconfigip a / ifconfigShow IP address
ipconfig /allip aFull network details
pingpingCheck connectivity
tracerttracerouteTrace route
netstat -anss -tulnOpen ports
arp -aip neighARP table
nslookupnslookupDNS lookup
route printip routeRouting table

🖥️ System Information

WindowsLinuxPurpose
systeminfoneofetchSystem info
tasklistps auxRunning processes
taskkillkill PIDKill process
hostnamehostnameSystem name
whoamiwhoamiLogged-in user

📁 File & Directory Management

WindowsLinuxPurpose
dirlsList files
cdcdChange directory
mkdirmkdirCreate folder
rmdirrmdirDelete empty folder
copycpCopy files
movemvMove/rename
delrmDelete file

🔐 User & Permissions

WindowsLinuxPurpose
whoami /groupsidUser info
net usercat /etc/passwdUser list
runassudoAdmin access
chmodChange permissions
chownChange ownership

📦 Software & Updates

WindowsLinuxPurpose
winget installapt installInstall software
winget removeapt removeUninstall
Windows Updateapt updateUpdate list
apt upgradeUpgrade system

🔥 Ethical Hacking–Relevant Commands (Beginner)

PurposeCommand
Check open portsss -tuln
Scan networknmap
Show DNS infodig
Check firewalliptables -L
Monitor traffictcpdump
Wireless infoiwconfig

🧠 Exam / Viva Tip for Students

Q: What is the Linux equivalent of ipconfig?
A: ip a (preferred) or ifconfig (legacy)


📌 Students“If you know Windows commands, Linux is just a translation—not a new language.”

✅ What Students MUST Be Able to Explain in Exams / Viva

  • Difference between ls and ls -l

  • What an IP address is

  • Why ports matter

  • What Nmap does

  • Why ethical hacking needs permission

  • Difference between scanning & attacking

No comments:

Post a Comment