Linux is the go-to operating system for hackers and security professionals. Whether you’re diving into ethical hacking, penetration testing, or cybersecurity research, mastering Linux is a must. This cheat sheet will help you get started with essential Linux commands and concepts every hacker should know.
📌 Why Linux for Hackers?
-
Open-source & customizable 🛠️
-
Powerful command-line tools 🔥
-
Preferred by cybersecurity experts 👨💻
-
Widely used in penetration testing 🔍
🎥 Watch the Video - Linux Basics for Hackers Part 1
🎬 Watch Here: Linux Basics for Hackers - Part 1
🔹 Basic Linux Commands
Command |
Description |
pwd |
Print current working directory |
ls |
List files and directories |
cd |
Change directory |
mkdir |
Create a directory |
rm -rf |
Remove a file or directory (be careful!) |
cp |
Copy files and directories |
mv |
Move or rename files |
cat |
Display file contents |
nano / vim
|
Open file editor |
history |
Show command history |
clear |
Clear the terminal |
🔹 User & Permission Commands
Command |
Description |
whoami |
Show current user |
id |
Display user ID and group ID |
sudo |
Execute command as root |
chmod |
Change file permissions |
chown |
Change file owner |
passwd |
Change user password |
🔹 Networking & Reconnaissance
Command |
Description |
ifconfig / ip a
|
Show network interfaces |
ping |
Check network connectivity |
netstat |
Display network connections |
nmap |
Scan network ports |
curl / wget
|
Fetch data from a URL |
dig / nslookup
|
DNS lookup |
🔹 Process & System Monitoring
Command |
Description |
ps |
Show running processes |
top / htop
|
Display system processes |
kill |
Terminate a process |
df -h |
Show disk space usage |
free -m |
Show memory usage |
uptime |
Check system uptime |
uname -a |
Display system info |
who |
Show logged-in users |
🔹 File & Directory Navigation
Command |
Description |
find |
Locate files and directories |
grep |
Search text within files |
tar |
Compress/extract archives |
zip / unzip
|
Create/extract ZIP files |
locate |
Find files quickly |
🔹 Essential Hacking Tools in Linux
Tool |
Purpose |
nmap |
Network scanning |
Metasploit |
Exploitation framework |
Wireshark |
Packet analysis |
Hydra |
Brute-force attacks |
John the Ripper |
Password cracking |
sqlmap |
SQL Injection testing |
aircrack-ng |
Wi-Fi penetration testing |
This cheat sheet gives you a solid foundation in Linux, essential for cybersecurity and ethical hacking. Keep practicing these commands, explore more tools, and stay updated with new techniques.
🚀 Happy Hacking! 🏴☠️