0% found this document useful (0 votes)
117 views3 pages

Ethical Hacking with Parrot OS Basics

This lab is designed to teach learners the basics of Linux operating systems, specifically Kali Linux and Parrot OS, focusing on GUI navigation and terminal commands essential for ethical hacking. It includes hands-on exercises for file management, directory navigation, and command usage in the Linux shell. The lab concludes with a reflection on key concepts and encourages daily practice to prepare for advanced penetration testing tools.

Uploaded by

umarghafoor135
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
117 views3 pages

Ethical Hacking with Parrot OS Basics

This lab is designed to teach learners the basics of Linux operating systems, specifically Kali Linux and Parrot OS, focusing on GUI navigation and terminal commands essential for ethical hacking. It includes hands-on exercises for file management, directory navigation, and command usage in the Linux shell. The lab concludes with a reflection on key concepts and encourages daily practice to prepare for advanced penetration testing tools.

Uploaded by

umarghafoor135
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

Ethical Hacking Lab - Linux Basics (Kali/Parrot OS Compatible)

Lab Overview

This lab is designed to familiarize learners with Linux-based operating systems, particularly
Kali Linux (as mentioned in Cisco’s course) or Parrot OS (as used by the student). The goal
is to get comfortable with the GUI, the terminal shell, and basic file/folder operations
necessary for ethical hacking.

Parrot OS users can perform all the steps exactly as described, since the tools and commands
remain identical in both distros.

Part 1: GUI Familiarization


Objective:

 Understand GUI components


 Learn to navigate the Applications menu

Instructions:

1. Login: Username: kali / Password: kali (or Parrot defaults)


2. Explore top panel: network, audio, time, desktops.
3. Right-click panel > Panel Preferences > Customize layout.
4. Click the first icon on the top-left to open Applications Menu.
5. Browse through categories like:
o Information Gathering
o Vulnerability Analysis
o Web Application Analysis
o Wireless Attacks

Note: Many tools open in the terminal, some have GUI.

Part 2: Linux Terminal Basics


Objective:

 Practice navigation and command usage in Linux Shell

Step-by-Step Commands:

🔹 pwd - Print working directory


/home/kali

🔹 cd - Change directory

cd /home/kali # Go to home
cd .. # Go up one level (parent)
cd ~ # Go to home directory
cd . # Stay in current directory

🔹 ls - List directory contents

ls -l # Detailed list
ls -la # Show hidden files (., ..)

🔹 mkdir - Create folders

mkdir kali_folder1 kali_folder2 kali_folder3

🔹 Create nested folder

mkdir /home/kali/kali_folder3/kali_folder4

🔹 Redirect output

echo echo this message # Output to screen


echo redirect this to a file > text_file.txt # Output to file

🔹 Append to file

echo this text will be appended >> text_file.txt

🔹 View file content

cat text_file.txt

🔹 Remove files & directories

rm text_file.txt # Delete file


rm -r kali_folder1 # Delete folder and contents

🔹 Move files/directories

mv kali_folder2/text_file.txt . # Move file to current folder


mv kali_folder3/ kali_folder2/ # Move entire folder into another

Reflection Questions & Concepts


🔸 What does ~ mean?

It refers to the current user’s home directory. For kali, it's /home/kali.
🔸 What does . and .. mean?

 . = current directory
 .. = parent directory (one level up)

🔸 What does > and >> do?

 > = overwrite/redirect output to a file


 >> = append output to a file

🔸 Why use . in move command?

The dot . stands for current directory — telling the system to place the file here.

🔸 How to get command documentation?


man ls # or man any-command

✅ Conclusion
You have now practiced:

 Linux directory structure


 Navigating and manipulating files
 Understanding user levels (root vs normal)
 Working with redirections and permissions

These fundamentals are critical as you dive into real penetration testing tools and scenarios.
Parrot OS will handle all these commands perfectly — keep practicing daily and get ready for
advanced labs!

Prepared by: ChatGPT x Umar Bhai's Hacker Journey 🚀


OS Used: Parrot Security Edition (VM)
Course: Cisco Certified Ethical Hacking
Lab: Day 1 - Linux Terminal & GUI Fundamentals

Common questions

Powered by AI

In ethical hacking, user levels, specifically the distinction between 'root' and 'normal' users, determine the level of access and control over the system. 'Root' users have comprehensive privileges, allowing unrestricted access to all commands and files, crucial for tasks that require altering system-level configurations. In contrast, 'normal' users have limited permissions, protecting the system from unauthorized modifications. Understanding and manipulating these user roles is important for performing realistic penetration tests .

In Linux, using '. (dot)' in move and copy commands signifies the current working directory. When using commands like 'mv' or 'cp' with a '.' at the destination path, it simplifies specifying the directory into which files or directories should be moved or copied, particularly when the destination is the current directory itself, thereby streamlining file management operations .

Using a virtual machine like Parrot Security Edition is beneficial for learning ethical hacking and Linux terminal fundamentals because it provides a controlled environment where learners can safely experiment and practice without risking damage to a physical machine. This flexibility allows the exploration of different hacking techniques, the execution of potentially dangerous commands, and the testing of systems in isolation, essential for comprehensive skill development .

The '>' command in Linux is used to redirect output to a file, overwriting its contents if the file already exists. In contrast, '>>' appends the output to the end of the file without deleting existing data. You would use '>' when you want to completely replace the file's content and '>>' when you want to add additional data without losing the current contents .

The command 'cd ..' is used in the Linux terminal to change the current working directory to the parent directory, effectively moving one level up in the directory hierarchy .

GUI components enhance the user experience in ethical hacking on Linux systems like Parrot OS by providing intuitive navigation and organization of tools. This user-friendly interface helps streamline tasks such as information gathering, vulnerability analysis, and other hacking operations, making it easier for users to access and manage applications efficiently compared to command-line operations .

Understanding the Linux directory structure is crucial for ethical hacking because it allows hackers to effectively navigate the file system, manage permissions, and locate important files and directories needed for penetration testing scenarios. Proficiency in this area enhances the ability to manipulate the environment for ethical hacking tasks, such as accessing necessary tools and scripts .

Mastering file and directory manipulation commands is critical for ethical hacking as it enables hackers to organize and access files quickly, automate repetitive tasks, and efficiently manage system resources. This competence is essential for creating and managing exploits, storing sensitive information securely, and maintaining operational efficiency during hacking missions .

A user can access help documentation for Linux commands by using the 'man' command followed by the specific command they need help with, such as 'man ls'. This is important as it provides detailed information about the command's usage, options, and behavior, enabling users to fully utilize command functionalities accurately .

Daily practice with Parrot OS commands prepares ethical hackers for advanced labs and real-world scenarios by enhancing their familiarity and comfort with essential tools and command line operations. Consistent practice helps in building muscle memory and deepening comprehension of Linux systems, which is vital for efficiently navigating challenges and responding to unexpected situations during penetration testing .

You might also like