1 00:00:00,240 --> 00:00:05,520 Before we actually proceed to creating our virtual machine that we will use for hacking, I believe 2 00:00:05,520 --> 00:00:12,380 most of you are wondering why Linux, why are we installing Linux operating system on a virtual machine? 3 00:00:13,320 --> 00:00:16,710 Can't we hack using Windows or Mac OS? 4 00:00:17,640 --> 00:00:21,600 Well, yes, but Linux is something far better for that. 5 00:00:22,540 --> 00:00:24,670 So what were the benefits for Lennix? 6 00:00:25,660 --> 00:00:30,190 First thing that's great about Lennox is that it is an open source operating system. 7 00:00:31,240 --> 00:00:38,080 This means we can inspect the code of it and see how it is made and what programs or functions it runs, 8 00:00:38,810 --> 00:00:45,340 it can be used for any type of work, not only for hacking, but many programmers also use Linux. 9 00:00:45,880 --> 00:00:49,180 Many servers all over the world are running on Linux. 10 00:00:49,810 --> 00:00:55,730 And another great thing about it is that most of the Linux districts are free of cost. 11 00:00:56,500 --> 00:01:04,450 Maybe some of you have heard about Ubuntu, Linux, Mint or Debian, while to, for example, use an 12 00:01:04,450 --> 00:01:06,540 updated Windows operating system. 13 00:01:06,970 --> 00:01:09,400 You must pay for a key or license. 14 00:01:10,180 --> 00:01:13,450 Linux, on the other hand, is free to download for anyone. 15 00:01:14,020 --> 00:01:22,690 And not only that, but it also due to it being an open source, it allows the users to edit, copy 16 00:01:22,720 --> 00:01:30,190 or distribute various aspects of Linux based operating system without violating any copyright law or 17 00:01:30,190 --> 00:01:31,570 terms and conditions. 18 00:01:32,320 --> 00:01:38,800 This is one of the main reasons hackers use Linux because they can easily develop software is used for 19 00:01:38,800 --> 00:01:45,250 hacking and penetration testing, and they can change and edit the operating system for their needs. 20 00:01:46,150 --> 00:01:53,470 Another good thing is that it is also very light requires less disk space consumes less ram in order 21 00:01:53,470 --> 00:02:00,300 to run so it can be easily ran alongside any other operating system like Windows and Mac OS. 22 00:02:01,000 --> 00:02:07,870 And last but not least, is that, as we mentioned, due to Linux being an open source and allowing 23 00:02:07,870 --> 00:02:14,950 anyone to change and interact with the operating system, it allows people to create an operating system 24 00:02:15,100 --> 00:02:20,890 that will specifically be made for one purpose, such as for ethical hacking or penetration testing 25 00:02:21,580 --> 00:02:24,850 and learning systems like that already exist. 26 00:02:25,270 --> 00:02:32,020 There are Linux distro called Linux, Perret Backtrack and others that are specially made for penetration 27 00:02:32,020 --> 00:02:38,380 testing and checking for security loopholes, and all of them are widely being used by hackers. 28 00:02:39,100 --> 00:02:45,520 In this course we will be using Linux, one of the Linux bistro's specially created for hackers and 29 00:02:45,520 --> 00:02:46,630 penetration testers. 30 00:02:47,600 --> 00:02:54,440 What's great about it is that it automatically comes after installation with a bunch of different tools 31 00:02:54,830 --> 00:03:01,490 used by penetration testers for hacking, and we're going to cover those tools and go step by step through 32 00:03:01,490 --> 00:03:01,740 them. 33 00:03:02,090 --> 00:03:05,930 Plus, we'll be installing tools created by other people. 34 00:03:06,170 --> 00:03:11,840 And at the advanced parts of this course, we will be creating our own hacking tools. 35 00:03:12,690 --> 00:03:13,820 How cool will that be? 36 00:03:14,730 --> 00:03:20,340 So now that we know exactly which Linux distro are we going to install and what are the benefits of 37 00:03:20,340 --> 00:03:25,510 Linux in the next few videos, we can create our virtual hacking lab. 38 00:03:26,040 --> 00:03:26,610 See you there.