📘 HYDRA TOOL COMPLETE TUTORIAL BOOK
LearnSkillsHub is a technology learning blog focused on providing simple and practical tutorials for beginners. This blog covers ethical hacking, Kali Linux guidance, cyber security basics, networking concepts, and modern technology tutorials. Our goal is to make complex technical topics easy to understand through clear, step-by-step explanations and ethical learning practices. OFFICIAL YOUTUBE :-https://youtube.com/@learnskills-rk7rv?si=zeXay9-j6APMVbAp
Kali Linux is one of the most powerful operating systems for ethical hacking, penetration testing, and cybersecurity.
To master Kali, you must first understand the Linux command line — because almost every hacking tool depends on terminal usage.
In this blog, you’ll learn all essential Kali Linux commands, explained in simple words with real demos.
Let’s begin your hacking journey 🚀
| Command | Description | Demo |
|---|---|---|
pwd |
Shows your current working directory | Example: → pwd → /home/kali |
ls |
Lists files and folders | ls → shows contents; ls -la → detailed view including hidden files |
cd |
Change directory | cd Desktop, cd .. (go back), cd / (root) |
clear |
Clears the terminal screen | clear |
whoami |
Displays your current username | whoami → kali |
| Command | Description | Demo |
|---|---|---|
mkdir |
Create new directory | mkdir test_folder |
rmdir |
Remove empty directory | rmdir test_folder |
touch |
Create empty file | touch notes.txt |
cat |
Show file content | cat notes.txt |
rm |
Delete files | rm notes.txt, or rm -r foldername (for folders) |
cp |
Copy files/folders | cp file1.txt /home/kali/Desktop/ |
mv |
Move or rename | mv old.txt new.txt or mv file.txt /root/ |
| Command | Description | Demo |
|---|---|---|
uname -a |
Shows OS info | uname -a → Linux kernel details |
top |
Real-time system usage | Press q to exit |
df -h |
Disk usage info | df -h → human-readable format |
free -h |
RAM usage | free -h |
uptime |
Shows system uptime | uptime |
| Command | Description | Demo |
|---|---|---|
ifconfig |
Show all network interfaces | ifconfig (old version), use ip a for new |
ping |
Test connection to a host | ping google.com |
netstat -tuln |
Show open ports | netstat -tuln |
traceroute |
Trace route to host | traceroute google.com |
curl |
Fetch data from URL | curl https://example.com |
wget |
Download files | wget https://example.com/file.zip |
| Command | Description | Demo |
|---|---|---|
adduser |
Add new user | sudo adduser hacker |
passwd |
Change password | passwd hacker |
su |
Switch user | su hacker |
id |
Show user ID info | id |
who |
List logged-in users | who |
| Command | Description | Demo |
|---|---|---|
chmod |
Change file permissions | chmod 755 script.sh |
chown |
Change ownership | chown kali:kali file.txt |
sudo |
Run command as root | sudo apt update |
| Command | Description | Demo |
|---|---|---|
apt update |
Update package list | sudo apt update |
apt upgrade |
Upgrade all packages | sudo apt upgrade |
apt install <package> |
Install new tool | sudo apt install nmap |
apt remove <package> |
Remove tool | sudo apt remove nmap |
dpkg -l |
List installed packages | dpkg -l |
sudo apt install nmap
nmap -sP 192.168.1.0/24
✅ Scans your entire local network for live devices.
sudo airmon-ng start wlan0
sudo airodump-ng wlan0mon
sudo aircrack-ng captured_file.cap -w /usr/share/wordlists/rockyou.txt
✅ Used for Wi-Fi network auditing (educational use only ⚠️).
sudo wireshark
✅ Analyze live packets and detect vulnerabilities.
| Shortcut | Action |
|---|---|
Ctrl + C |
Stop running command |
Ctrl + L |
Clear terminal |
↑ / ↓ |
Navigate command history |
Tab |
Auto-complete commands |
!! |
Repeat last command |
Practice commands daily inside the Kali terminal.
Try real demos in Kali Linux VirtualBox to avoid system damage.
Learn bash scripting to automate repetitive tasks.
Always use hacking tools ethically (never attack without permission).
You’ve just learned the most complete Kali Linux command tutorial with real examples and demos.
Mastering these commands gives you the foundation to explore ethical hacking tools like Metasploit, Nmap, Aircrack-ng, Hydra, Burp Suite, and more.
Keep experimenting — because the command line is your real hacking playground ⚔️.
Comments
Post a Comment