1 00:00:00,952 --> 00:00:02,280 -: (Narrator) Before we actually proceed 2 00:00:02,280 --> 00:00:05,970 to creating our virtual machine that we will use for hacking 3 00:00:05,970 --> 00:00:09,447 I believe most of you are wondering...why Linux? 4 00:00:09,447 --> 00:00:13,290 Why are we installing Linux operating system 5 00:00:13,290 --> 00:00:14,433 on a virtual machine? 6 00:00:15,360 --> 00:00:19,350 Can't we hack using Windows or Mac OS? 7 00:00:19,350 --> 00:00:20,760 Well, yes we can, but 8 00:00:20,760 --> 00:00:23,163 Linux is something far better for that. 9 00:00:24,060 --> 00:00:27,390 So what are the benefits of using Linux? 10 00:00:27,390 --> 00:00:29,010 First thing that's great about Linux is 11 00:00:29,010 --> 00:00:31,893 that it is an open source operating system. 12 00:00:32,820 --> 00:00:35,160 This means that we can inspect the code of it 13 00:00:35,160 --> 00:00:36,600 and see how it is made 14 00:00:36,600 --> 00:00:39,930 and what programs or functions it runs. 15 00:00:39,930 --> 00:00:43,200 It can be used for any type of work, not only for hacking. 16 00:00:43,200 --> 00:00:45,360 Many programmers also use Linux. 17 00:00:45,360 --> 00:00:48,780 Many servers all around the world are running on Linux. 18 00:00:48,780 --> 00:00:50,850 And another great thing about it is that 19 00:00:50,850 --> 00:00:53,883 most of the Linux distros are free of cost. 20 00:00:54,870 --> 00:00:56,460 Maybe some of you have heard about 21 00:00:56,460 --> 00:00:59,610 Ubuntu, Linux, Mint, or Debian. 22 00:00:59,610 --> 00:01:03,120 Well to use an updated Windows operating system 23 00:01:03,120 --> 00:01:05,129 you must pay for a license. 24 00:01:05,129 --> 00:01:09,060 Linux, on the other hand, is free to download for anyone. 25 00:01:09,060 --> 00:01:11,640 And not only that, but it also, 26 00:01:11,640 --> 00:01:15,210 due to it being an open source, it allows the users 27 00:01:15,210 --> 00:01:19,470 of Linux to edit, copy or distribute various aspects 28 00:01:19,470 --> 00:01:21,510 of Linux based operating system 29 00:01:21,510 --> 00:01:26,510 without violating any corporate law or terms and conditions. 30 00:01:27,240 --> 00:01:29,760 This is one of the main reasons hackers use Linux 31 00:01:29,760 --> 00:01:33,060 because they can easily develop softwares used for hacking 32 00:01:33,060 --> 00:01:35,255 and penetration testing on Linux, and they can change 33 00:01:35,255 --> 00:01:39,630 and edit the operating system for their needs. 34 00:01:39,630 --> 00:01:42,960 It is also very light, requires lesser disc space, 35 00:01:42,960 --> 00:01:45,420 consumes lesser RAM in order to run. 36 00:01:45,420 --> 00:01:49,080 So it can be easily ran alongside any other operating system 37 00:01:49,080 --> 00:01:51,243 like Windows and Mac OS. 38 00:01:52,230 --> 00:01:55,140 And last but not least is that, as we mentioned 39 00:01:55,140 --> 00:01:56,730 due to Linux being an open source 40 00:01:56,730 --> 00:01:58,860 and allowing anyone to change and interact 41 00:01:58,860 --> 00:02:01,650 with the operating system, it allows people to 42 00:02:01,650 --> 00:02:05,400 create an operating system that will specifically be made 43 00:02:05,400 --> 00:02:07,770 for one purpose, such as, for example 44 00:02:07,770 --> 00:02:10,259 ethical hacking or penetration testing. 45 00:02:10,259 --> 00:02:14,010 And Linux distros like this already exist. 46 00:02:14,010 --> 00:02:15,600 There are Linux distros called 47 00:02:15,600 --> 00:02:18,990 Cal Linux, Parrot, Backtrack and others 48 00:02:18,990 --> 00:02:20,220 that are especially made 49 00:02:20,220 --> 00:02:24,000 for penetration testing and checking for security loopholes. 50 00:02:24,000 --> 00:02:27,570 And all of them are widely being used by hackers. 51 00:02:27,570 --> 00:02:31,800 And in this course, we will be using Kali Linux. 52 00:02:31,800 --> 00:02:34,200 One of the Linux distros specially created 53 00:02:34,200 --> 00:02:36,750 for hackers and penetration testers. 54 00:02:36,750 --> 00:02:38,070 What's great about it is 55 00:02:38,070 --> 00:02:42,240 that it automatically comes after installation with bunch 56 00:02:42,240 --> 00:02:46,710 of different tools used by penetration testers for hacking 57 00:02:46,710 --> 00:02:48,720 and we are going to cover those tools 58 00:02:48,720 --> 00:02:50,610 and go step by step through them. 59 00:02:50,610 --> 00:02:53,970 Plus we'll be installing tools created by other people. 60 00:02:53,970 --> 00:02:56,100 And at the advanced parts of this course 61 00:02:56,100 --> 00:02:59,430 we'll be creating our own hacking tools. 62 00:02:59,430 --> 00:03:01,200 How cool will that be? 63 00:03:01,200 --> 00:03:04,650 So now that we know exactly which Linux distros are we 64 00:03:04,650 --> 00:03:07,874 going to install and what are the benefits of using Linux 65 00:03:07,874 --> 00:03:12,273 in the next video, we can create our virtual hacking lab.