Kali Linux Failed To Request New Sb State

Below are the current list of repositories on my Linux node root@node1 rpms# yum repolist Loaded plugins: fastestmirror, langpacks Loading mirror speeds from cached hostfile. base: centos.excellmedia.net. epel: repos.del.extreme-ix.org. extras: centos.excellmedia.net. openstack-stein: centos.excellmedia.net. updates: centos.excellmedia.net repo id repo name status base/7/x8664 CentOS-7. Screenshot from 2014-02-13 21:53:40.png Hey, everyone, I'm still a beginner working with Linux systems, and I didn't find in this forum a post about the Errors in Software Updates. Make sure that your Linux Distro converts to WSL2 if you want your Distro to operate under a full Linux Kernel. There is no harm in invoking Windows Update at this point. I recommend you do. Install the Windows Hypervisor Platform. (The likes of VMware and Virtual Box need it.) No harm in rebooting the computer at this point. In this video you can download installed version of kali linux 2020.2Please Like & Subscribe Hackers Life.

In our previous IPTables firewall series article, we reviewed how to add firewall rule using “iptables -A”.

We also explained how to allow incoming SSH connection. On a high-level, it involves following 3 steps.

  1. Delete all existing rules: “iptables -F”
  2. Allow only incoming SSH: “iptables -A INPUT -i eth0 -p tcp –dport 22 -j ACCEPT”
  3. Drop all other incoming packets: “iptables -A INPUT -j DROP”

The above works. But it is not complete. One problem with the above steps is that it doesn’t restrict the outgoing packets.

Default Chain Policy

The default policy of a chain is ACCEPT. If you don’t what what a chain means, you better read our iptables introduction article. So, both the INPUT and OUTPUT chain’s default policy is ACCEPT. In the above 3 steps we dropped all incoming packets at the end (except incoming ssh). However, we didn’t restrict the outgoing traffic.

As you notice below, it says “(policy ACCEPT)” next to all the three chain names (INPUT, OUTPUT, and FORWARD). This indicates that the default chain policy is ACCEPT.

So, you have two options here.

Option 1: Add drop rules

At the end, add the following three drop rules that will drop all incoming, outgoing, and forward packets (except those that are defined above these three rules). If you do this, the default chain policy is still ACCEPT, which shouldn’t matter, as you are dropping all the packets at the end anyway.

Option 2: Change the default chain policy to DROP

At the beginning, execute the following three commands that will change the chain’s default policy to DROP.

Now, if you add the allow ssh rule: “iptables -A INPUT -i eth0 -p tcp –dport 22 -j ACCEPT”, and do iptables -L, you’ll notice that it says “(policy DROP)” next to all the three chains.

But there is a problem here. The allow ssh incoming connection rule will not work anymore, because all the outgoing packets are dropped.

Allow Incoming Connections

When the default policy is DROP for INPUT and OUTPUT chains, for every incoming firewall rule, you need to specify the following two rules.

  1. Request rule: This is the request that comes from the client to the server for the incoming connection.
  2. Response rule: This is for the response that goes out from the server to the client (for the corresponding incoming request).

Example 1: Allow incoming SSH connection

This is to allow SSH connection from outside to your server. i.e You can ssh to your server from outside.

This involves two steps. First, we need to allow incoming new SSH connections. Once the incoming ssh connection is allowed, we also need to allow the response back for that incoming ssh connection.

First, Allow incoming SSH connection request, as shown below.

In the above example:

  • iptables -A INPUT: Append the new rule to the INPUT chain. For incoming connection request, this always has to be INPUT.
  • -i eth0: This refers to the input interface. For incoming connections, this always has to be ‘-i’.
  • -p tcp: Indicates that this is for TCP protocol.
  • –dport 22: This refers to the destination port for the incoming connection. Port 22 is for ssh.
  • -m state: This indicates that the “state” matching module is used. We’ll discuss more about “-m” option (and all available matching modules for iptables) in future article.
  • –state NEW, ESTABLISHED: Options for the “state” matching module. In this example, only NEW and ESTABLISHED states are allowed. The 1st time when a SSH connection request is initiated from the client to the server, NEW state is used. ESTABLISHED state is used for all further request from the client to the server.

Next, Allow outgoing (ESTABLISHED state only) SSH connection response (for the corresponding incoming SSH connection request).

In the above example:

  • iptables -A OUTPUT: Append the new rule to the OUTPUT chain. Since this is for the response rule (for the corresponding incoming request) that goes out from the server, this should be OUTPUT.
  • -o eth0: This refers the output interface. For outgoing connections, this always has to be ‘-o’.
  • -p tcp: Indicates that this is for TCP protocol.
  • –sport 22: This refers to the source port for the outgoing connection. Port 22 is for ssh. Since the incoming request (from the previous rule) came to the “destination” port, the outgoing response will go through the “source” port.
  • -m state: This indicates that the “state” matching module is used.
  • –state ESTABLISHED: Since this is a response rule, we allow only ESTABLISHED connection (and not any NEW connection).

Example 2: Allow incoming HTTP connection

This is to allow HTTP connection from outside to your server. i.e You can view your website running on the server from outside.

Just like the above SSH incoming rules, this also involves two steps. First, we need to allow incoming new HTTP connection. Once the incoming HTTP connection is allowed, we need to allow the response back for that incoming HTTP connection.

First, Allow incoming HTTP connection request, as shown below.

Next, Allow outgoing (ESTABLISHED only) HTTP connection response (for the corrresponding incoming SSH connection request).

Note: In the above HTTP request and response rule, everything is same as the SSH example except the port number.

Allow Outgoing Connections

When the default policy is DROP for the INPUT and OUTPUT chains, for every outgoing firewall rule, you need to specify the following two rules.

  1. Request rule: This is the request that goes out from the server to outside for the outgoing connection.
  2. Response rule: This is for the response that comes back from the outside to the server (for the corresponding outgoing request).

Example 3: Allow outgoing SSH connection

This is to allow SSH connection from your server to the outside. i.e You can ssh to outside server from your server.

This involves two steps. First, we need to allow outgoing new SSH connection. Once the outgoing ssh connection is allowed, we also need to allow the response back for that outgoing ssh connection.

First, Allow outgoing SSH connection request, as shown below.

In the above example:

  • iptables -A OUTPUT: Append the new rule to the OUTPUT chain. For outgoing connection request, this always has to be OUTPUT.
  • -o eth0: This refers the output interface. For outgoing connections, this always has to be ‘-o’.
  • -p tcp: Indicates that this is for TCP protocol.
  • –dport 22: This refers to the destination port for the outgoing connection.
  • -m state: This indicates that “state” matching module is used.
  • –state NEW, ESTABLISHED: Options for the “state” matching module. In this example, only NEW and ESTABLISHED states are allowed. The 1st time when a SSH connection request is initiated from the server to the outside, NEW state is used. ESTABLISHED state is used for all further request from the server to the outside.

Next, Allow outgoing (ESTABLISHED only) SSH connection response (for the corresponding incoming SSH connection request).

In the above example:

  • iptables -A INPUT: Append the new rule to the INPUT chain. Since this is for the response rule (for the corresponding outgoing request) that comes from the outside to the server, this should be INPUT.
  • -i eth0: This refers the input interface. For incoming connections, this always has to be ‘-i’.
  • -p tcp: Indicates that this is for TCP protocol.
  • –sport 22: This refers to the source port for the incoming connection. Since the outgoing request (from the previous rule) went to the “destination” port, the incoming response will come from the “source” port.
  • -m state: This indicates that the “state” matching module is used.
  • –state ESTABLISHED: Since this is a response rule, we allow only ESTABLISHED connection (and not any NEW connection).

Putting it all together

Create rules.sh shell script which does the following:

  1. Delete all existing rules
  2. Set default chain policies
  3. Allow inbound SSH
  4. Allow inbound HTTP
  5. Allow outbound SSH

First, create the rules.sh

Next, execute the rules.sh and view the rules.

Using this as a basis you should be able to write your own incoming and outgoing iptables firewall rules. There is lot more to cover in IPTables. Stay tuned!

Previous articles in the iptables series:

The easiest way to use Kali Linux by commands but you should know there are thousands of the Kali Linux commands. And the biggest problem for the new user to learn these commands.

Frequently used Kali Linux Commands

Kali Linux is an operating system similar to other Linux based operating systems. So basic Kali Linux commands are similar to others.

This Operating system is designed for penetration testing and Ethical hacking. Of course, It has a bunch of ultimate Free Hacking Tools used by black hat hackers.

So basic kali Linux commands are similar to other Linux operating systems but Advance commands are different and awesome.

Commands are made Kali Linux more Attractive and awesome

In this article, I am going to cover how to use Kali Linux commands exactly without knowing anything about the tool.

Many students want to learn Kali Linux free of cost, but due to lack of resources, They can’t. If you are one of them then this article is useful for you.

And they start searching online, and they find lots of articles written by multiple experts, These are available online, but most articles are related on How to install Kali Linux on VirtualBox, how to use tools of Kali Linux.

There is a big difference between the installation of the Kali Linux and using the Kali Linux tools. The gap is how to use Kali Linux commands still exist.

How to finish Kali Linux using Gap?

In this tutorial I will try to remove that gap, so you can complete your journey from installation to using the tools and get involved in penetration testing. In the last article, I have written about Kali Linux hacker so if you want to know more about Kali Linux you can go there and read about it. otherwise, you have another option to know about Kali Linux go on Official website Kali Linux
Before writing this article I think about lots of factor about commands, and find out that:

Kali Linux commands Categories:

  1. System commands
  2. Tool commands
  3. Switches Or Sub-tools

System Commands in Kali Linux:

System commands are basic commands which are used for a system administration, these commands are helpful to manage the Kali Linux operating system.

You can use these commands to manage another Linux Operating system, for example, Ubuntu, Mint, RHEL, etc.

As I have told you in my previous post “Kali Linux system is the combination of Linux OS and Hacking tools”. So all the basic commands are similar to other Linux System.

In this tutorial, I am going to describe basic and advanced Kali Linux commands to manage the operating system.
So good news here, First you will learn basic commands, then you can go for advanced kali Linux commands.

In the sense of meaning, all commands are the same for a normal user, sudo user, and Root user.

Kali Linux commands start from “a”. I know there are many Kali Linux command start from “a”.

Do you want to know? How many commands start from a?

It is very simple to open the terminal and type “a” and press the “tab” tab key from your keyword twice you will see all command start from “a” word.

I find 222 commands start from “a” at the time of writing this article. See in the image below.

Very basic commands can be used by Normal user. The identification of normal user ‘$’ sign, you can see in the following image [email protected]:~$.

1# Arch Command:

You can use the arch command to know computer architecture. Arch command prints things such as “i386, i486, i586, alpha, arm, m68k, mips, sparc, x86_64, etc.

You can use the following Syntax to check your system architecture:

#arch

2# Arp Command:

ARP stands for Address Resolution Protocol, which is used to find the address of a network neighbor for a given IPv4 address.

arp command is used to show the arp table of your Kali Linux system. You can use this command on other Linux systems as well as Windows operating systems.

arp without any option will print the current content of the ARP (MAC/CAM) table.

#arp

#3 arping Command

arping command is similar to ping command but it is working on an Ethernet layer. arping command gives the result of reachability and round-trip time on an IP address in a local network.

#arping -I eth0 -c 5 IPADDRESS

4# Aspell Command:

aspell is a spell checker command in Kali Linux, you can give file name or anything from standard input to check for misspellings.

Syntax: aspell check [options] filename

#aspell -c filename.txt

5# awk command”

awk command is used to manipulate data and generate a report in the scripting language. It allows the user to use a variable, functions both numeric and functions and logical operators.

You can write tiny and effective programs in the form of a statement by using awk utility in Kali Linux.

What can you do with awk?

  1. AWK Operations:
    (a) Scans a file line by line
    (b) Splits each input line into fields
    (c) Compares input line/fields to pattern
    (d) Performs action(s) on matched lines
    awk is Useful For:
    (a) Transform data files
    (b) Produce formatted reports
  2. Programming Constructs:
    (a) Format output lines
    (b) Arithmetic and string operations
    (c) Conditionals and loops

Syntax:

awk options ‘selection _criteria {action }’ input-file > output-file

6# bg command

bg command is used to control shell jobs. It resumes execution of a stoped or suspended process and bg command used to restart a stopped background process

Example
I used ping command followed by technicalustad.com then pressed CTRL +z to stop the service.

Next, I used jobs commands to see available jobs.

Again I used bg command to restart the stoped command “ping technicalustad.com”

7# basename command

You can use basename command to remove base directory information and suffixes from the file names. You can print any file name with any leading directory components removed

Syntax:

#basename NAME [SUFFIX]
or
#basename OPTION NAME

8# Bzip2

Bzip2 is a basic utility for compress and decompress files. It is pre-installed in kali Linux as other commands.

Syntax:

#bzip2 [Options] [filename]

An example:

I used cat command to create a new file name with the filename.txt

Later I used bzip2 command followed by -z (option for compress file) and file name.

Next option -d, I used for decompressing “filename.txt.bz2”

When you use bzip2 command to compress file, The new file will be created with .bz2 extension. You will decompress any file with .bz2 extension by using bzip2 command.

9# cal command:

Cal command is used to display calendar

$cal

10# cat command

This tutorial for hackers, So if you will get access to any computer of the drive then you will 100% find some files. so cat command is used to see, edit matter inside the file. You can create a file and add content inside the file.

How is it possible?

Simple use

$cat > ‘New File’ [Create a new file or overwrite data on the desired file]

$cat “file name” [See matter inside file]

$ cat >> “filename” [add some data into file]

11# cksum command

cksum command stands for checksum is used to calculates a CRC (cyclic redundancy check) and byte count for each input file, and writes it to standard output.

In a simple way, this command is used to check file’s data for being corrupted when transferred one location to another.

Command syntax is simple and straight forward

#cksum filename

12# Clear command

Clear command is used to clear the terminal screen when you are running multiple commands in terminal the terminal screen getting full.

So use the clear command and enjoy a clean screen again.3

#clear

13# cmp Command:

the cmp command is used to compare two files byte by byte. If a difference is found, it reports the byte and line number where the first difference is found.

If no differences are found, by default, cmp returns no output.

Basic syntax of cmp command

#cmp file1.txt file2.txt

14# comm Command

you can use comm command to compare two sorted files line by line. The basic syntax to use this command:

#comm file1.txt file2.txt

15# cp command:

Cp command is used to copy one or more files from one location to another location.

#cp /source/location/path /destination/location/path

If you are copying file from the current working directory then give a file name and source address.

#cp filename /destination/location/path

Kali Linux Failed To Request New Sb State

Use the cp command carefully because it will overwrite files without asking. It means if the destination file name already exists, its data will be erased. you can use -i option to prompt for confirmation.

This is big command and can be used in different ways. here you can read more about https://www.computerhope.com/unix/ucp.htm

16# Crontab Command:

In kali Linux operating systems, The crontab command is used to view or edit the table of commands to be run by cron. The cron table is the list of tasks scheduled to run at regular time intervals on the Linux system.

The daemon which reads the crontab and executes the commands at the right time is called cron.

Crontab command examples

#crontab -e
Edit your crontab.

#crontab -l
Display (“list”) the jobs of your crontab.

#crontab -r
Remove your crontab.

#crontab -u technicalustad -e
Edit crontab for user technicalustad.

16# cut Command:

cut command is used to cut parts of lines from specified files or piped data and print the result to standard output. It can be used to cut parts of a line by delimiter, byte position, and character

The basic syntax for the cut command is as follows:

cut OPTION… [FILE]…

You can use cut command followed and specified with filed

for the example:

#cut -f 1,3 file.txt

16# Date Command:

date command is used for checking the current date and time.

the date can be changed by running the following code

$ date –set=’20 September 2019 13:09′

but the normal user can’t change system time, Then you are thinking about “how to change system time” Of-course I will teach you in this article, dont worry about it.

Some examples of date command:

$ date -d now
$ date -d today
$ date -d yesterday
$ date -d tomorrow
$ date -d sunday
$ date -d last-sunday

17# dc command:

The desk calculator works with postfix notation; rather like many HP Calculators. Basic arithmetic uses the standard + – / * symbols but entered after the digits.

Syntax

dc [-V] [–version] [-h] [–help] [-e scriptexpression]
[–expression=scriptexpression] [-f scriptfile] [–file=scriptfile]

18# Dd command

dd stands for data duplicator, which is mainly used to copy and convert data. but this tool can be used for:

  • Backing up and restoring an entire hard drive or a partition.
  • Creating virtual filesystem and backup images of CD or DVDs called ISO files
  • Copy regions of raw device files like backing up MBR (master boot record).
  • Converting data formats like ASCII to EBCDIC.
  • Converting lowercase to uppercase and vice versa.

dd command is not basic command so you must be superuser to execute it.

Syntax of dd command is

dd if= of= [Options]

19# df command

The df command stands for Disk Free is used to reports file system disk space usage. It displays the amount of disk space available on the file system of Kali Linux. The df command reports how much free disk space we have in our system.

Kali Linux Failed To Request New Sb State Farm

simple syntax:

#df

20# diff command

Diff command is used to display the differences between two files.

Basic Syntax:

#diff file1.txt file2.txt

21# diff3 command

Diff3 command is used to show differences among the three files.

Basic Syntax

#diff3 file1.txt file2.txt file3.txt

22# dig command

dig command is a powerful command in kali Linux used to for DNS lookup. Simple use and simple syntax

#dig www.domainname.com

You will get all the information related DNS of the website.

23# dir Command

dir command is used to print the content list of a directory. Most of Linux user use ls command instead of dir command. but you can use it.
Basic Syntax:

#dir [OPTION] [FILE]

Example:

#dir /etc

24# echo command:

Display message on the screen

The echo command is one of the most basic commands in Linux used to display a message on the screen. The arguments passed to echo are printed to the standard output.

echo is commonly used in shell scripts to display a message or output the results of other commands.

Example:

#echo Hello world!

25# Egrep Command

The egrep command is used to search files for lines that match a text pattern. It performs the match by using extended regular expressions. Running egrep is equivalent to running grep with the -E option.
Basic Example:

#egrep “support|help|windows” myfile.txt

Search for patterns of support help and windows in the file myfile.txt.

26# Eject Command

Eject command is used to remove a removable media (typically a CD-ROM, floppy disk, tape, or JAZ or ZIP disk) under software control. You can eject DVD by pressing a button, but you can remove it without touching button just type the following command:

#eject

Use the following command, in the case above command, is not working:

#eject /dev/cdrom

#eject /dev/cdrw

#eject /dev/dvd

#eject /dev/dvdrom

#eject /dev/dvdrw

27# ethtool Command

ethtool is a networking utility used to configure ethernet devices on Kali Linux.

#ethtool [ethernet card]

If you want to display network usage statistics with ethtool by using the following command

#eththoo -S eth0

where eth0 is a card name

28# whoami command:

it is looking something difference command but it is used to tell about you. For example if you forget “which user is logged in?. This command will tell you who are you current.

$whoami

29# pwd command:

pwd command is used for print working directory. It means “On what location you are“. here location meaning is directory and sub-directory.

The parent directory is “/” called root directory.

Don’t be confused with /root directory, this root directory “/root” is home directory for root user.

30# ls command:

ls command is used to see files and directory inside a directory. using ‘ls’ without any location will list the files and folders inside the current directory.

If you want to look up inside another directory, you will have to specify location.

$ls

$ls /var

$ls /home/username

31# cd command:

the cd command is a very useful command and plays a very important role for Linux user. This command is used for changing directory. And the basic syntax will be as below:

cd /desired/location

If you use blank ‘cd’ without location then you will move in the user’s home directory. so see the power of cd commands and enjoy!

$cd

$cd ..

$cd /desired/location ($cd /home/vijay)

32# mkdir command:

Do you know about the directory? It is a term used for the folder. You can say windows folder is a directory in Linux It is very easy to create a folder in Windows” but not in Linux. T

The graphical interface is really awesome, but the command interface is not less. The command-line interface is the fastest way to operate a Linux based Operating System. Linux users love it.

mkdir command is used to create a directory. if want to create a directory within the current directory, just use mkdir ‘directory name’.

if you want to create a directory in the desired location then

$mkdir /desired/location/directory name.

$mkdir lab

$mkdir /home/vijay/lab1

33# mv command:

If you don’t like files and folders on the current location and want to move to another location, then mv command is useful for you. mv command work as a cut and paste in windows.

$mv /Source_location /destination/location

mv source location if the file or directory does not exist in current location if the file/folders within current location then us mv file/folder name [space] destination location {destination location = where you want to move}

mv command is also used for rename the file and folder

$mv ‘old filename’ ‘new filename’

34# rm command:

rm command is used to remove files and folders. In other words this command for deleting files and folders.

35# uname command:

Do you want to know the name of your Linux? if yes then use uname command
The “uname” stands for (Unix Name), displays detailed information about the machine name, Operating System and Kernel.

$uname

$uname -a

36# uptime command:

this command is used to check how long your system is running. uptime for your system, this command can be used for forensics also.

37# users command:

users command is used to check current logged in user, On my Kali Linux system I have logged in with root user and later I switched to vijay user.

38# Less Command

less command is used for quickly view file on terminal. user can page up and down. Press ‘q‘ to quit from less window.

$less /etc/passwd

39#More Command

more command is used for quickly view file and shows details in percentage. Press up and down arrow for page up and down. Press ‘q‘ to quit out from more window.

$more /etc/passwd

40# Sort command

You can sort lines of text files in ascending order. with -r options will sort in descending order.

$sort filename.txt [ascending order]

$sort -r filename.txt [descending order]

41# VI Command

Vi is a most popular text editor used for most of the UNIX-like OS. Here is a great article for vi editor

42# Free command

The free command shows free, total and swap memory information in bytes.
Free with -t options shows total memory used and available to use in bytes.

$free

$free -t

43# history command:

The history command is used to check recent running commands. Oh really it is useful because Forgetting is the nature of human. IF you forget previous running command, you can use history command.

$history

44#: Find Command

The find command is used for search files in Linux. Searching any files and folders in Windows is easy but in Linux.

To find a file by name, size, type, etc in the graphical interface is quite easy, And it is not really so easy in CLI (Command Line Interface)

Find is a command-line utility that allows you to search for files and directories in a directory hierarchy based on user-given expression and applies user-specified action on each matched file

Usage: find [-H] [-L] [-P] [-Olevel] [-D debugopts] [path…] [expression]

More Detail: How to Find a File in Linux in All Directories

45# apt-get command:

apt-get is a package manager used to install, remove, purge, and update packages.

the apt-get command is a most popular command for Debian based operating systems including Kali Linux.

All the available options are below with apt-get command.

#46 dpkg command

dpkg command is used to Install deb File in Kali Linux. You can remove packages by using dpkg command as well.

Kali Linux is a Debian based operating system so you can install .deb files only.

For example: you can install Nessus on Kali Linux by using dpkg because the Nessus files do not exist in the repository.

You can run the following command to install packages on Kali Linux by using dpkg command

#dpkg -i package_name

dpkg –i /{Download_Location}/Nessus-{Version}.deb

More Details: Install Nessus on Kali Linux

#47 Du Command

The du command is used to display the amount of disk space used by files and directories.

If you run command du without specified path then it will give the result behalf of the current working directory.

If you run du command followed by a specific path, it will summarize disk usage of each file and subdirectories in that directory.

Kali Linux Failed To Request New Sb States

I used the du command without any argument and path. I got a shocking result. You run the command now, check the result and tell me our experience in the comment box.

More: Du Command to get Size of Directory in Linux

#48 Curl command

Curl is a command-line utility to transfer data from or to a server. You can say it is used to download and upload files and data by using one of the supported protocols (DICT, FILE, FTP, FTPS, GOPHER, HTTP, HTTPS, IMAP, IMAPS, LDAP, LDAPS, POP3, POP3S, RTMP, RTSP, SCP, SFTP, SMB, SMBS, SMTP, SMTPS, TELNET and TFTP). The command is designed to work without user interaction.

curl offers a busload of useful tricks like proxy support, user authentication, FTP upload, HTTP post, SSL connections, cookies, file transfer resume, Metalink, and more. As you will see below, the number of features will make your head spin! See libcurl(3) for details

Use the following command to know more about #curl

#curl –help

More Details: What is Curl in Linux, How to use? You should check these methods

#49 Adduser command

Adduser command is used to add a new user. You can create multiple users by using adduser command.

#adduser username

More Details: How to Create User in Linux by Adduser

#50 passwd command To change password

Username and password are the basic security of the Kali Linux operating system. You are working on cybersecurity / ethical hacking.

You must keep in mind all security points, and managing password is one of them.

Kali Linux Failed To Request New Sb Statement

passwd command is used to change the password of a normal user / sudo user/ root user.

Basic example: You are login with root user and want to change current user password then simple syntax as follows:

#passwd

As you hit enter, you get the screen to enter a new password twice. You will not see anything on the screen at the time of entering a password. Don’t worry at all.

Give a new password and hit enter, again enter the same password and hit enter. Your password for the current user will be updated.

More Details: How to change password in Linux

#51 usermod command

usermod command is used to modify a user in a group.

By default, Kali Linux is operated by the root user, but it is a loophole of security. So You must use kali Linux with normal user.

But the problem starts from here, lots of tools are required administrative permission. Normal user can not run these tools.

You can run these tools by the root user or sudo user. usermod command will help to promote normal user to sudo user by running following command

#52 lsb_release command to check the version of Kali Linux

lsb_relase command is used to check the version of Kali Linux. There are multiple switches are used with this command.

#lsb_release -a

#53 SCP command

scp command is used to copy files from one device to another device securely. There are multiple ways to transfer files from one system to another.

But scp copy files over ssh protocol. One system should have an ssh server running.

Hacker used this command when the compromised system and transfer files. Basic syntax as bellow.

$scp [OPTION] [[email protected]]SRC_HOST:]file1_Path [[email protected]]DEST_HOST:]file2

More Details: How to use SCP command in Linux Copy files securely through ssh server

#54 unzip command

Now you are a Kali Linux user, and you are using Kali Linux. You will download many files from different -2 sources.

You will find most of the files in zip format, you can’t use them. You have the challenge to extract files. unzip command will help you get extracted files.

The basic syntax of unzip command

#unzip filename.zip

More details: How to unzip file in Linux by using commands and GUI

If Appreciate My Work, You should consider:

  • Join Group for Discussion Facebook Group
  • Get your own self-hosted blog with a Free Domain at ($2.96/month)
  • Buy a Coffee to Us! Make Small Contribution by Paypal
  • Support us by taking our :Online Courses
  • Contact me :[email protected]