🐉 Kali Linux Full Command Tutorial (With Examples & Demos)
🔰 Introduction
Kali Linux is one of the most powerful operating systems for ethical hacking, penetration testing, and cybersecurity.
To master Kali, you must first understand the Linux command line — because almost every hacking tool depends on terminal usage.
In this blog, you’ll learn all essential Kali Linux commands, explained in simple words with real demos.
Let’s begin your hacking journey 🚀
⚙️ 1. Basic System Commands
| Command | Description | Demo |
|---|---|---|
pwd |
Shows your current working directory | Example: → pwd → /home/kali |
ls |
Lists files and folders | ls → shows contents; ls -la → detailed view including hidden files |
cd |
Change directory | cd Desktop, cd .. (go back), cd / (root) |
clear |
Clears the terminal screen | clear |
whoami |
Displays your current username | whoami → kali |
💾 2. File & Folder Management
| Command | Description | Demo |
|---|---|---|
mkdir |
Create new directory | mkdir test_folder |
rmdir |
Remove empty directory | rmdir test_folder |
touch |
Create empty file | touch notes.txt |
cat |
Show file content | cat notes.txt |
rm |
Delete files | rm notes.txt, or rm -r foldername (for folders) |
cp |
Copy files/folders | cp file1.txt /home/kali/Desktop/ |
mv |
Move or rename | mv old.txt new.txt or mv file.txt /root/ |
🔍 3. System Info & Monitoring
| Command | Description | Demo |
|---|---|---|
uname -a |
Shows OS info | uname -a → Linux kernel details |
top |
Real-time system usage | Press q to exit |
df -h |
Disk usage info | df -h → human-readable format |
free -h |
RAM usage | free -h |
uptime |
Shows system uptime | uptime |
🌐 4. Network & Internet Commands
| Command | Description | Demo |
|---|---|---|
ifconfig |
Show all network interfaces | ifconfig (old version), use ip a for new |
ping |
Test connection to a host | ping google.com |
netstat -tuln |
Show open ports | netstat -tuln |
traceroute |
Trace route to host | traceroute google.com |
curl |
Fetch data from URL | curl https://example.com |
wget |
Download files | wget https://example.com/file.zip |
🔒 5. User Management Commands
| Command | Description | Demo |
|---|---|---|
adduser |
Add new user | sudo adduser hacker |
passwd |
Change password | passwd hacker |
su |
Switch user | su hacker |
id |
Show user ID info | id |
who |
List logged-in users | who |
🧰 6. Permission Commands
| Command | Description | Demo |
|---|---|---|
chmod |
Change file permissions | chmod 755 script.sh |
chown |
Change ownership | chown kali:kali file.txt |
sudo |
Run command as root | sudo apt update |
📦 7. Package Management
| Command | Description | Demo |
|---|---|---|
apt update |
Update package list | sudo apt update |
apt upgrade |
Upgrade all packages | sudo apt upgrade |
apt install <package> |
Install new tool | sudo apt install nmap |
apt remove <package> |
Remove tool | sudo apt remove nmap |
dpkg -l |
List installed packages | dpkg -l |
🕵️♂️ 8. Hacking Tool Examples (Demo Section)
🔸 Example 1: Scan Network Using Nmap
sudo apt install nmap
nmap -sP 192.168.1.0/24
✅ Scans your entire local network for live devices.
🔸 Example 2: Crack Wi-Fi Passwords (Aircrack-ng)
sudo airmon-ng start wlan0
sudo airodump-ng wlan0mon
sudo aircrack-ng captured_file.cap -w /usr/share/wordlists/rockyou.txt
✅ Used for Wi-Fi network auditing (educational use only ⚠️).
🔸 Example 3: Capture HTTP Traffic (Wireshark)
sudo wireshark
✅ Analyze live packets and detect vulnerabilities.
⚡ 9. Useful Shortcuts
| Shortcut | Action |
|---|---|
Ctrl + C |
Stop running command |
Ctrl + L |
Clear terminal |
↑ / ↓ |
Navigate command history |
Tab |
Auto-complete commands |
!! |
Repeat last command |
🧠 10. Pro Tips for Learners
-
Practice commands daily inside the Kali terminal.
-
Try real demos in Kali Linux VirtualBox to avoid system damage.
-
Learn bash scripting to automate repetitive tasks.
-
Always use hacking tools ethically (never attack without permission).
🎯 Conclusion
You’ve just learned the most complete Kali Linux command tutorial with real examples and demos.
Mastering these commands gives you the foundation to explore ethical hacking tools like Metasploit, Nmap, Aircrack-ng, Hydra, Burp Suite, and more.
Keep experimenting — because the command line is your real hacking playground ⚔️.
No comments:
Post a Comment