Search
Linux for Hackers
Learn to fully leverage the Linux’s powerful capabilities for penetration testing, scripting, and exploitation.

The CyberWarrior Handbook, Part 1
Welcome back, my cyberwarriors! In this series, we will detail how an individual or small group of cyberwarriors can impact global...
5 min read
3,770 views

Vagrant: Building Secure Testing Environments
Welcome back, aspiring cyberwarriors! Creating and managing virtual machines has traditionally been a tedious and time-consuming process....
5 min read
496 views

Introduction to the IoT/Embedded Linux: The OpenWRT Project
Welcome back, my aspiring cyberwarriors! As you know, the various mobile carriers around the world sell a device they often refer to as a...
3 min read
4,614 views


Reverse Engineering Malware: Cactus Ransomware, Basic Static Analysis
Ransomware is always evolving, and Cactus is no exception. When I came across this sample, I knew it was worth a closer look. It’s built...
5 min read
846 views


Linux Basics for Hackers: The Linux Logging System
Welcome back, my aspiring cyberwarriors! One of the most overlooked areas on the Linux operating system is the logging system. If you are...
4 min read
2,155 views


Linux Firewalls: The Modern NFTable Firewall
Welcome back, my aspiring cyberwarriors! Firewalls play a key role in cybersecurity as they can filter out unwanted and malicious traffic...
5 min read
1,009 views

Getting Started with Docker, Part 1: Installing Kali Linux in a docker Container
Welcome back, my aspiring cyberwarriors! Increasingly, we are seeing cybersecurity tools and apps using docker. For instance, in my...
3 min read
6,153 views

Privilege Escalation: The Dirty Pipe Exploit to Escalate Privileges on Linux Systems
Welcome back, my aspiring cyberwarriors! Often, after successfully compromising a system, we are limited to the privilege's of the...
3 min read
5,701 views

Linux Basics for Hackers, Part 14: Using the curl command to Download Web Site Source Code
Welcome back my aspiring cyber warriors! Now that you have mastered the Basics of Linux, let's begin looking at some of the more esoteric...
3 min read
7,104 views

Linux Firewalls: Creating an Application Layer IDS/IPS with fwsnort
Welcome back, my aspiring cyberwarriors! In a previous tutorial here, I introduced you to the Linux firewall, iptables. iptables enables...
3 min read
5,020 views

Linux Basics for Hackers, Part 13: Running Kali Linux in Windows (WSL)
Welcome back my aspiring cyber warriors! As most of you know, I am the author of the best-selling book, Linux Basics for Hackers from No...
3 min read
11,167 views


Linux Basics for Hackers, Part 12: The Linux Philosophy
Welcome back my aspiring hackers! Although this article may have been better placed first in this series, I doubt that anyone would have...
4 min read
1,472 views


Linux Firewalls: Uncomplicated Firewall (ufw)
Welcome back, my aspiring security engineers! There are a multitude of reasons for using Linux but one of the most overlooked is its...
4 min read
7,706 views


Linux Basics for the Aspiring Hacker, Part 3 (Creating, Removing and Renaming Files and Directories)
Welcome back, my aspiring hackers! In part 1 of this series, I introduced you to the file system, the cd or change directory command and...
5 min read
7,876 views


Linux Firewalls Training, November 2-4
Now is your chance to learn to build and manage your own Linux firewall! This course, taught by Master OTW, the author of Linux Basics...
1 min read
647 views


Linux Basics for Hackers, Part 11: Linux Firewalls (iptables)
Welcome back, my aspiring cyber warriors! A firewall is one of the key security measures necessary for a secure network. Linux has a...
4 min read
15,854 views


Netcat- the All-Powerful Linux Utility
Welcome back, my aspiring cyberwarriors! Netcat is one of those few tools--like nmap, Metasploit, Wireshark and few others-- that every...
5 min read
2,901 views


Linux Basics for Hackers, Part 10: Loadable Kernel Modules (LKM)
Welcome back, my aspiring cyberwarriors! In this continuing series on Linux Basics for Hackers, I now want to address Loadable Kernel...
3 min read
8,607 views

Getting Started with Kali Linux 2020
Welcome back, my aspiring cyber warriors! Kali Linux is the operating system of choice for aspiring hackers and advanced hackers as well....
7 min read
42,044 views


Metasploit Basics for Hackers, Part 25: Web Delivery with Linux/UNIX/OsX
Welcome back, my aspiring cyber warriors! Metasploit, one of my favorite hacking/pentesting tools, has so many capabilities that even...
3 min read
3,945 views