Linux Basics for Hackers
To become a professional hacker, you MUST know Linux. Although a few hacker tools are available for Windows, well over 95% are Linux-based. This area covers essential commands, file system navigation, user and permission management, scripting, service enumeration, and practical techniques for offensive security. Learn how to control Linux like a hacker.
Linux Basics for Hackers, Part 0: Getting Started with Kali Linux 2020
Welcome back, my aspiring cyber warriors! Kali Linux is the operating system of choice for aspiring hackers and advanced hackers as well. Developed by Offensive Security, it contains many of the tools a hacker needs to get started. Recently, Offensive Security released a new version of Kali Linux nominally known
Linux Basics for Hackers, Part 01
Many aspiring hackers are unfamiliar with Linux having learned computer basics in a Windows or Mac environment. Sometimes this unfamiliarity is the single most important obstacle to mastering the essential skills to become a professional white hat hacker. For many good reasons, Linux is THE only hacking platform. That having
Linux Basics for Hackers, Part 02: Finding stuff
In many cases, the greatest hurdle to becoming a white hat hacker is proficiency with the command line (cli) Linux. This series is designed specifically for those with aspirations of becoming a pentester/white hat hacker, but lack the basic CLI Linux skills. Aspiring Hackers just starting with Linux are
Linux Basics for Hackers, Part 03: Creating, Removing and Renaming Files and Directories
Welcome back, my aspiring hackers! In part 1 of this series, I introduced you to the file system, the cd or change directory command and some other Linux basics. In Part 2 of this series, I showed you how to find stuff in Linux. In this tutorial we will be
Linux Basics for Hackers, Part 04: Networking
From working with thousands of aspiring hackers, I have found that very often the greatest hurdle to getting started in hacking is unfamiliarity with Linux. After years of working with the GUI’s of MAC and Windows, newbies in this field get scared away by the command line and Linux. Overcoming
Linux Basics for Hackers, Part 05: Adding and Removing Software
One of the most fundamental tasks in Linux or–for that matter–any operating system, is adding and removing software. We often need to install software that did not come with our distribution or remove unwanted software. In Debian (of which Kali and Ubuntu belong to), the software package manager is aptitude.
Linux Basics for Hackers, Part 06: Managing File Permissions
I’ve been writing these Linux tutorials in an attempt to fill the void in the education of some aspiring hackers into the Linux operating system. Without good Linux skills, the world of hacking is largely closed door to you. There is a lot to know, and in this tutorial, we’ll
Linux Basics for Hackers, Part 07: BASH Scripting Basics
This series, Linux for Hackers, was developed to help familiarize the uninitiated into the world of using Linux for hacking. If you have not read Part 1-6, you can find them here. Any self-respecting hacker must be able to script. For that matter, any self-respecting Linux administrator must
Linux Basics for Hackers, Part 08: Managing the User Environment
Managing the User Environment Among the areas that Linux newcomers find problematic, managing the user environment variables might be the most obscure. Although Windows operating systems have environment variables, most users seldom–if ever–manage their environment variables. To get the most from our Linux hacking system, you need to both understand
Linux Basics for Hackers, Part 09: Text Manipulation
As I have mentioned several times in my previous Linux tutorials, nearly everything in Linux is a file, and very often they are text files. For instance, all of the configuration files in Linux are text files. To reconfigure an application in Linux, we simply need to open the configuration
Linux Basics for Hackers, Part 10: Loadable Kernel Modules (LKM)
Welcome back, my aspiring cyberwarriors! In this continuing series on Linux Basics for Hackers, I now want to address Loadable Kernel Modules (LKMs). LKM’s are critical to the Linux administrator as they provide them the capability to add functionality to the kernel without having to recompile the kernel. Things like
Linux Basics for Hackers, Part 11: Linux Firewalls (iptables)
Welcome back, my aspiring cyber warriors! A firewall is one of the key security measures necessary for a secure network. Linux has a number of firewalls available to the infosec practitioner that can be crucial to securing their systems without the high cost of commercial systems. It only requires a
Linux Basics for Hackers, Part 12: The Linux Philosophy
Welcome back my aspiring hackers! Although this article may have been better placed first in this series, I doubt that anyone would have read it when just starting out studying Linux. Now, that you are well into your Linux studies and have some familiarity with how it operates, I’d like
Linux Basics for Hackers, Part 13: Running Kali Linux in Windows (WSL)
Welcome back my aspiring cyber warriors! As most of you know, I am the author of the best-selling book, Linux Basics for Hackers from No Starch Press. I was inspired to write it from experience teaching hacking to US military and intelligence personnel. Over and over again, I found very
Linux Basics for Hackers, Part 14: Using the curl command to Download Web Site Source Code
Welcome back my aspiring cyber warriors! Now that you have mastered the Basics of Linux, let’s begin looking at some of the more esoteric but equally powerful Linux commands for the hacker.One of those key commands is curl or client URL. This command enables the Linux user to send and
Linux Basics for Hackers Free Video Tutorials
Master OTW has teamed up with David Bombal to bring you a free abridged version of his Linux tutorials.
For a deeper dive into Linux for hacking, check out the full book Linux Basics for Hackers, available on Amazon and at major bookstores.
Use coupon code linuxv2 to get 50% off the Video Companion, where Master OTW personally guides you through every lesson in the book.
Playlist
See What our Students are Saying




























