Hacking For Babies
  • Introduction
  • Ethical Hacking
  • Kali Linux
    • Why Kali ?
    • Virtual Machine
    • kali on Cloud
    • Bootable USB
    • Dual Boot Kali
    • Kali Nethunter
    • Most Used Linux Commands
    • Additional Information
  • Network Basics
    • What is the internet ?
    • Key Words
    • Network devices
    • LAN / WAN
    • VPN (Virtual Private Network)
    • Deep and Dark Web
    • Networking Commands
    • Additional Information
  • OSINT
    • Maltego
    • Google Advanced Search Operators
    • OSINT Username Finder
    • Social Media OSINT
    • Reverse Image Search
    • Protect yourself from OSINT
    • Additional Information
  • Digital Forensics
  • Phishing Attacks
    • Temporary Numbers
    • GitHub Projects/Tools
    • Kali Pre-Installed Tools
    • Emails Tricks
    • How to secure yourself from phishing attacks
    • Additional Information
  • Hardware Attacks
    • Marketplaces and Websites
    • Keylogger
    • USB Killer
    • Ethernet Hacking Tools
    • Flipper Zero
    • Bad USB
  • HID Attacks
    • Classic Bad USB
    • Wireless Bad USB
    • Keystroke Injection Cable
    • Other Tools Using the Some Concept
    • Simple Ducky Script
    • Reverse Shell Ducky Script
    • Solution for Bad USB
  • Cryptography
    • What is Cryptography ?
    • Simple Cryptography Algorithms
    • Hash Algorithms
    • Symmetric / Asymmetric cryptography
    • RSA Cryptosystem
    • Quantum Computers VS Cryptography
    • Steganography: Hiding Data in music and photos
    • Additional Information
  • Password Attacks
    • Dictionary Attacks
    • Brute Force Attacks
    • Hashcat
    • Hydra
    • Other Password Attacks Tools
    • Protect your Self against Password Attacks
  • Wireless Attacks
    • RFID / NFC Attacks
    • Bluetooth Attacks
    • MouseJack Attacks
    • IR Replay Attacks
    • RF Attacks
    • Wifi Attacks
  • WIFI Attacks
    • Wireless Adapters
    • Basic WIFI Manipulation
    • Deauthentication Attack
    • WIFI Cracking
    • MITM Attacks
    • Prebuild WIFI Pentesting Tools
    • WIFI Attack Solution
    • Additional Information
  • WIFI Cracking
    • WEP Cracking
    • WPS Attack
    • WPA Handshake Capture
    • PMKID Hash Capture
    • Hashcat Cracking
    • Wifite
    • Airgeddon
    • Fern WIFI Cracker
    • Protecting your Wi-Fi network from cracking
  • Coming Soon
Powered by GitBook
On this page
  1. Kali Linux

Most Used Linux Commands

Here are commonly used Linux commands along with a brief description of their purpose:

  1. ls: List directory contents.

  2. cd: Change directory.

  3. pwd: Print working directory.

  4. mkdir: Create a new directory.

  5. rm: Remove files and directories.

  6. cp: Copy files and directories.

  7. mv: Move or rename files and directories.

  8. cat: Concatenate and display file contents.

  9. grep: Search for a pattern in files.

  10. find: Search for files and directories.

  11. chmod: Change file permissions.

  12. chown: Change file ownership.

  13. touch: Creates an empty file.

  14. tar: Archive and compress files.

  15. gzip: Compress files.

  16. unzip: Extract files from a zip archive.

  17. sudo: Executes a command with administrative privileges.

  18. sudo su: Elevate privileges to superuser (root) in Linux with sudo su

  19. wget: Download files from the web.

  20. ssh: Secure shell client for remote access.

  21. scp: Securely copy files between systems.

  22. ping: Send ICMP echo requests to a host.

  23. ifconfig: Configure network interfaces.

  24. netstat: Network statistics and connections.

  25. whois: Look up domain registration details.

  26. dig: DNS lookup utility.

  27. ps: Display running processes.

  28. top: Monitor system resources and processes.

  29. kill: Terminate processes.

  30. df: Display disk usage.

  31. du: Estimate file and directory sizes.

  32. mount: Mount file systems.

  33. umount: Unmount file systems.

  34. ln: Create links between files.

  35. head: Display the first lines of a file.

  36. tail: Display the last lines of a file.

  37. man: Display the manual pages for a command.

  38. history: Display command history.

  39. clear: Clear the terminal screen.

  40. date: Display or set the system date and time.

  41. echo: Print arguments to the terminal.

  42. sed: Stream editor for text manipulation.

  43. awk: Text processing and pattern matching.

  44. cut: Cut out selected portions of files.

  45. sort: Sort lines of text.

  46. uniq: Remove duplicate lines from a file.

  47. wc: Count lines, words, and characters in a file.

  48. diff: Compare files line by line.

  49. git: Version control system for tracking changes in files.

  50. apt-get: Package management utility for Debian-based systems.

  51. yum: Package management utility for RPM-based systems.

  52. systemctl: Control system services.

  53. shutdown: Shutdown or reboot the system.

These are just a few examples of the many Linux commands available. Learning and becoming familiar with these commands will greatly enhance your ability to work effectively in a Linux environment.

PreviousKali NethunterNextAdditional Information

Last updated 1 year ago