Exploring Hacker Operating Systems - Pentoo
Offered By: SecurityFWD via YouTube
Course Description
Overview
Explore the Pentoo Linux distribution, a Gentoo-based operating system designed for penetration testing, in this comprehensive video tutorial. Dive into the installation process, key features, and security aspects of Pentoo, including its focus on password cracking and wireless attacks. Learn about the differences between Pentoo and Debian-based systems, discover the Pentoo Pi variant, and understand the Portage package management system. Follow along as the tutorial guides you through VM setup, installation steps, default settings, and networking configurations. Gain insights into updating Pentoo, installing additional tools, and using applications like Airgeddon. By the end of this hour-long exploration, you'll have a solid understanding of Pentoo's capabilities and its potential applications in the field of cybersecurity.
Syllabus
Countdown
Intro
Pentoo First Impressions
Difference from Debian
Pentoo Website
Pentoo Pi
Releases
VM Setup
Installer
Login and Default Password
Desktop Background
Networking Disabled by Default
Install to Disk
Pentoo Updates
More Installing
Up and Running
Apps and Installing Tools
Airgeddon
Closing Thoughts
Taught by
SecurityFWD
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network