Search
Linux Basics for Hackers
Linux is the backbone of many systems, servers, and cybersecurity tools used in hacking and penetration testing.


Linux Basics for Hackers: Building a Router with nftables
Welcome back, aspiring cyberwarriors! As you know, traditional hardware routers can be expensive, inflexible, and often come with...
5 min read
37 views


Linux Basics for Hackers: gcc, Mastering the Compiler That Powers Linux Development
Welcome back, aspiring cyberwarriors! In our world of Linux, we often need to transform our human-readable source code into...
5 min read
105 views


Linux Basics for Hackers, the Make Command: Compiling and Installing Software from Source in Linux
Welcome back, aspiring Linux enthusiasts! In our journey through the Linux ecosystem, we often encounter situations where the software we...
4 min read
183 views


Socat: The Advanced Hacker's Network Tool
Welcome back, my aspiring cyberwarriors! In the world of cybersecurity, certain tools become legendary not because they're flashy, but...
3 min read
334 views


Linux Basics for Hackers: The Linux Logging System
Welcome back, my aspiring cyberwarriors! One of the most overlooked areas on the Linux operating system is the logging system. If you are...
4 min read
2,312 views


Linux Basics for Hackers, Part 14: Using the curl command to Download Web Site Source Code
Welcome back my aspiring cyber warriors! Now that you have mastered the Basics of Linux, let's begin looking at some of the more esoteric...
3 min read
7,144 views


Linux Basics for Hackers, Part 13: Running Kali Linux in Windows (WSL)
Welcome back my aspiring cyber warriors! As most of you know, I am the author of the best-selling book, Linux Basics for Hackers from No...
3 min read
11,227 views


Linux Basics for Hackers, Part 12: The Linux Philosophy
Welcome back my aspiring hackers! Although this article may have been better placed first in this series, I doubt that anyone would have...
4 min read
1,489 views


Linux Basics for the Aspiring Hacker, Part 3 (Creating, Removing and Renaming Files and Directories)
Welcome back, my aspiring hackers! In part 1 of this series, I introduced you to the file system, the cd or change directory command and...
5 min read
7,897 views


Linux Basics for Hackers, Part 11: Linux Firewalls (iptables)
Welcome back, my aspiring cyber warriors! A firewall is one of the key security measures necessary for a secure network. Linux has a...
4 min read
15,896 views


Linux Basics for Hackers, Part 10: Loadable Kernel Modules (LKM)
Welcome back, my aspiring cyberwarriors! In this continuing series on Linux Basics for Hackers, I now want to address Loadable Kernel...
3 min read
8,654 views


Linux Basics for Aspiring Hackers, Part 1
Many aspiring hackers are unfamiliar with Linux having learned computer basics in a Windows or Mac environment. Sometimes this...
5 min read
49,236 views


Linux for Hackers, Part 7: BASH Scripting Basics
This series, Linux for Hackers, was developed to help familiarize the uninitiated into the world of using Linux for hacking. If you have...
7 min read
31,379 views


Linux Basics for the Aspiring Hacker, Part 4 (Networking)
From working with thousands of aspiring hackers, I have found that very often the greatest hurdle to getting started in hacking is...
6 min read
15,985 views


Linux Basics for the Aspiring Hacker, Part 2 (Finding stuff)
In many cases, the greatest hurdle to becoming a white hat hacker is proficiency with the command line (cli) Linux. This series is...
4 min read
21,143 views