Linux Basics
Overview
Linux is the operating system of offensive security. Kali Linux, Parrot OS, and most security tools run on Linux. Penetration testers need working fluency in the Linux command line — navigating filesystems, managing processes, understanding permissions, and scripting repetitive tasks.
This section covers the foundational Linux skills that every security professional needs before touching any offensive or defensive tooling. These are not optional — they are prerequisites. A tester who cannot read file permissions, trace a running process, or write a basic Bash loop will struggle with every tool built on top of these concepts.
Topics in This Section
- Essential Commands — Core commands for file operations, text processing, networking, and system information
- Filesystem Hierarchy — Linux directory structure, key paths, and where security-relevant data lives
- Permissions — File permissions, ownership, SUID/SGID bits, and access control
- Processes — Process management, signals, job control, and monitoring
- Bash Introduction — Shell basics, variables, loops, conditionals, and scripting fundamentals
General Approach
For security professionals learning Linux:
- Use the terminal exclusively — avoid GUIs for tasks the command line can handle. Speed and automation come from terminal fluency.
- Read man pages —
man <command>is the definitive reference. Learn to navigate them with/(search),n/N(next/previous match), andq(quit). - Practice on real systems — spin up VMs, break things, fix them. TryHackMe and HackTheBox provide Linux-focused practice environments.
- Script early — automate any task you do more than twice. Even a simple
forloop saves time and reduces errors on engagements.