Search
Linux for Hackers
Learn to fully leverage the Linux’s powerful capabilities for penetration testing, scripting, and exploitation.
5 min read
The CyberWarrior Handbook, Part 1
Welcome back, my cyberwarriors! In this series, we will be detailing how an individual or small group of cyberwarriors can impact global...
1,439 views
5 min read
Reverse Engineering Malware: Cactus Ransomware, Basic Static Analysis
Ransomware is always evolving, and Cactus is no exception. When I came across this sample, I knew it was worth a closer look. It’s built...
538 views
4 min read
Linux Basics for Hackers: The Linux Logging System
Welcome back, my aspiring cyberwarriors! One of the most overlooked areas on the Linux operating system is the logging system. If you are...
1,635 views
5 min read
Linux Firewalls: The Modern NFTable Firewall
Welcome back, my aspiring cyberwarriors! Firewalls play a key role in cybersecurity as they can filter out unwanted and malicious traffic...
869 views
4 min read
Command & Control Series Part I (Installing your own C2 Server on Kali Linux)
This series of posts is designed to guide you through setting up your own Command and Control (C2) server, specifically using the Havoc...
14,796 views
3 min read
Getting Started with Docker, Part 1: Installing Kali Linux in a docker Container
Welcome back, my aspiring cyberwarriors! Increasingly, we are seeing cybersecurity tools and apps using docker. For instance, in my...
5,968 views
3 min read
Introduction to the IoT/Embedded Linux: The OpenWRT Project
Welcome back, my aspiring cyberwarriors! As you know, the various mobile carriers around the world sell a device they often refer to as a...
3,210 views
3 min read
Privilege Escalation: The Dirty Pipe Exploit to Escalate Privileges on Linux Systems
Welcome back, my aspiring cyberwarriors! Often, after successfully compromising a system, we are limited to the privilege's of the...
5,578 views
3 min read
Linux Basics for Hackers, Part 14: Using the curl command to Download Web Site Source Code
Welcome back my aspiring cyber warriors! Now that you have mastered the Basics of Linux, let's begin looking at some of the more esoteric...
6,999 views
3 min read
Linux Firewalls: Creating an Application Layer IDS/IPS with fwsnort
Welcome back, my aspiring cyberwarriors! In a previous tutorial here, I introduced you to the Linux firewall, iptables. iptables enables...
4,843 views
3 min read
Linux Basics for Hackers, Part 13: Running Kali Linux in Windows (WSL)
Welcome back my aspiring cyber warriors! As most of you know, I am the author of the best-selling book, Linux Basics for Hackers from No...
10,966 views
4 min read
Linux Basics for Hackers, Part 12: The Linux Philosophy
Welcome back my aspiring hackers! Although this article may have been better placed first in this series, I doubt that anyone would have...
1,435 views
4 min read
Linux Firewalls: Uncomplicated Firewall (ufw)
Welcome back, my aspiring security engineers! There are a multitude of reasons for using Linux but one of the most overlooked is its...
7,521 views
5 min read
Linux Basics for the Aspiring Hacker, Part 3 (Creating, Removing and Renaming Files and Directories)
Welcome back, my aspiring hackers! In part 1 of this series, I introduced you to the file system, the cd or change directory command and...
7,797 views
1 min read
Linux Firewalls Training, November 2-4
Now is your chance to learn to build and manage your own Linux firewall! This course, taught by Master OTW, the author of Linux Basics...
633 views
4 min read
Linux Basics for Hackers, Part 11: Linux Firewalls (iptables)
Welcome back, my aspiring cyber warriors! A firewall is one of the key security measures necessary for a secure network. Linux has a...
15,694 views
5 min read
Netcat- the All-Powerful Linux Utility
Welcome back, my aspiring cyberwarriors! Netcat is one of those few tools--like nmap, Metasploit, Wireshark and few others-- that every...
2,864 views
3 min read
Linux Basics for Hackers, Part 10: Loadable Kernel Modules (LKM)
Welcome back, my aspiring cyberwarriors! In this continuing series on Linux Basics for Hackers, I now want to address Loadable Kernel...
8,513 views
7 min read
Getting Started with Kali Linux 2020
Welcome back, my aspiring cyber warriors! Kali Linux is the operating system of choice for aspiring hackers and advanced hackers as well....
42,012 views
3 min read
Metasploit Basics for Hackers, Part 25: Web Delivery with Linux/UNIX/OsX
Welcome back, my aspiring cyber warriors! Metasploit, one of my favorite hacking/pentesting tools, has so many capabilities that even...
3,895 views