Search
Linux for Hackers
Learn to fully leverage the Linux’s powerful capabilities for penetration testing, scripting, and exploitation.

3 min read
Introduction to the IoT/Embedded Linux: The OpenWRT Project
Welcome back, my aspiring cyberwarriors! As you know, the various mobile carriers around the world sell a device they often refer to as a...
4,304 views

5 min read
The CyberWarrior Handbook, Part 1
Welcome back, my cyberwarriors! In this series, we will detail how an individual or small group of cyberwarriors can impact global...
2,665 views


5 min read
Reverse Engineering Malware: Cactus Ransomware, Basic Static Analysis
Ransomware is always evolving, and Cactus is no exception. When I came across this sample, I knew it was worth a closer look. It’s built...
707 views


4 min read
Linux Basics for Hackers: The Linux Logging System
Welcome back, my aspiring cyberwarriors! One of the most overlooked areas on the Linux operating system is the logging system. If you are...
1,905 views


5 min read
Linux Firewalls: The Modern NFTable Firewall
Welcome back, my aspiring cyberwarriors! Firewalls play a key role in cybersecurity as they can filter out unwanted and malicious traffic...
965 views

4 min read
Command & Control Series Part I (Installing your own C2 Server on Kali Linux)
This series of posts is designed to guide you through setting up your own Command and Control (C2) server, specifically using the Havoc...
15,108 views

3 min read
Getting Started with Docker, Part 1: Installing Kali Linux in a docker Container
Welcome back, my aspiring cyberwarriors! Increasingly, we are seeing cybersecurity tools and apps using docker. For instance, in my...
6,056 views

3 min read
Privilege Escalation: The Dirty Pipe Exploit to Escalate Privileges on Linux Systems
Welcome back, my aspiring cyberwarriors! Often, after successfully compromising a system, we are limited to the privilege's of the...
5,624 views

3 min read
Linux Basics for Hackers, Part 14: Using the curl command to Download Web Site Source Code
Welcome back my aspiring cyber warriors! Now that you have mastered the Basics of Linux, let's begin looking at some of the more esoteric...
7,069 views

3 min read
Linux Firewalls: Creating an Application Layer IDS/IPS with fwsnort
Welcome back, my aspiring cyberwarriors! In a previous tutorial here, I introduced you to the Linux firewall, iptables. iptables enables...
4,954 views

3 min read
Linux Basics for Hackers, Part 13: Running Kali Linux in Windows (WSL)
Welcome back my aspiring cyber warriors! As most of you know, I am the author of the best-selling book, Linux Basics for Hackers from No...
11,067 views


4 min read
Linux Basics for Hackers, Part 12: The Linux Philosophy
Welcome back my aspiring hackers! Although this article may have been better placed first in this series, I doubt that anyone would have...
1,451 views


4 min read
Linux Firewalls: Uncomplicated Firewall (ufw)
Welcome back, my aspiring security engineers! There are a multitude of reasons for using Linux but one of the most overlooked is its...
7,582 views


5 min read
Linux Basics for the Aspiring Hacker, Part 3 (Creating, Removing and Renaming Files and Directories)
Welcome back, my aspiring hackers! In part 1 of this series, I introduced you to the file system, the cd or change directory command and...
7,841 views


1 min read
Linux Firewalls Training, November 2-4
Now is your chance to learn to build and manage your own Linux firewall! This course, taught by Master OTW, the author of Linux Basics...
641 views


4 min read
Linux Basics for Hackers, Part 11: Linux Firewalls (iptables)
Welcome back, my aspiring cyber warriors! A firewall is one of the key security measures necessary for a secure network. Linux has a...
15,780 views


5 min read
Netcat- the All-Powerful Linux Utility
Welcome back, my aspiring cyberwarriors! Netcat is one of those few tools--like nmap, Metasploit, Wireshark and few others-- that every...
2,886 views


3 min read
Linux Basics for Hackers, Part 10: Loadable Kernel Modules (LKM)
Welcome back, my aspiring cyberwarriors! In this continuing series on Linux Basics for Hackers, I now want to address Loadable Kernel...
8,558 views

7 min read
Getting Started with Kali Linux 2020
Welcome back, my aspiring cyber warriors! Kali Linux is the operating system of choice for aspiring hackers and advanced hackers as well....
42,033 views


3 min read
Metasploit Basics for Hackers, Part 25: Web Delivery with Linux/UNIX/OsX
Welcome back, my aspiring cyber warriors! Metasploit, one of my favorite hacking/pentesting tools, has so many capabilities that even...
3,930 views