Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      itsMe

      Linux for Beginners

      Recommended Posts

      Staff

      Hidden Content

        Give reaction to this post to see the hidden content.

      What you'll learn

      •     Linux Command Line
      •     Linux Bash Shell
      •     Create and manage new directories and files
      •     Getting information about hardware and software of the Linux computer
      •     Create new users and change user passwords
      •     Searching for files and folders using Find command
      •     Compressing and sorting in Linux
      •     Files and directories permissions and modification of the permissions
      •     Creating and executing executable files
      •     Networking in Linux
      •     Environment variables access and creation of the new environment variables
      •     Access of the remote Linux computer via SS

      Course content
      12 sections • 61 lectures • 5h 41m total length

      Requirements

      •     Just basic Computer knowledge
      •     Desire to learn core Linux features
      •     Get familiar with Linux Shells like Bash and Sh

      Description

      This course is all about Linux and Linux Shell.

      Understand HOW Linux works and learn mostly used core Linux features from basic commands till creation of the Linux scripts.

      And all features we will use ONLY in Shell, without any GUIs.

      If you want to learn how to manage users, manage and search files and directories, set correct permissions, compress and uncompress archives, verify network connectivity and connect to remote servers via SSH - this course is for you.

      Become a master of the Linux Shells like Bash or Sh.

      This is practical Linux course that includes tons of practical activities. The best way to learn is learn by doing. You can have zero knowledge about Linux. All will be taught from scratch, from basic to advanced features. If you want to get deep practical knowledge of Linux this course is for you!

      We will start by installing Docker and creating Linux container. You are right! We will use Docker because using Docker you could create any Linux computer in a matter of seconds on any platform - MacOS, Windows or other Linux computer.

      In practice sections you will perform multiple practice Linux activities:

      •     Create new directories and files in the Shell using commands mkdir, touch and cat
      •     Manage users using adduser, useradd and passwd commands, login under different users
      •     Change permissions of the files and directories using chmod command
      •     Create and execute executable scripts from the Shell
      •     Compress and uncompress files and directories using gzip and tar utilities
      •     Verify network settings and connectivity with remote servers using such commands as ifconfig, nslookup, ping and traceroute
      •     Downloading files from the remote servers using curl and wget
      •     Connection to remote servers via SSH

      To summarise, you will learn following core blocks of the Linux systems:

      - Linux networking

      - Permissions

      - Scripting

      - Creation and deletion of the files and directories

      - Movement and renaming of the files and directories

      Who this course is for:

      •     Software developers
      •     Network engineers
      •     DevOps engineers

      Hidden Content

        Give reaction to this post to see the hidden content.

      Hidden Content

        Give reaction to this post to see the hidden content.

      Share this post


      Link to post
      Share on other sites

      Join the conversation

      You can post now and register later. If you have an account, sign in now to post with your account.
      Note: Your post will require moderator approval before it will be visible.

      Guest
      Reply to this topic...

      ×   Pasted as rich text.   Paste as plain text instead

      ×   Your link has been automatically embedded.   Display as a link instead

      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. BlueEagle jRAT V1.5 [Windows RAT / Linux RAT / MAC RAT] [Windows RAT] [Linux RAT] [MAC RAT]
          Ver 1.5 Updated for hacking android , the apk Builder is standlone in zip file provided
          This is a cross platform RAT tool (java RAT) / (jRAT) which is { [Windows RAT] [Linux RAT] [MAC RAT] } which is fully programmed in java be a user friendly and easy to use and builds out trojans (.jar) and controls the victims running those trojans on same port at same time ,this tool is fully in java (Client & Server in java) and this tool is now registerd to be free , and on the user responsibility
          🏳 This is For Educational Purposes Only ! and User is responsible for his usage of this Tool 🔞
          For Example :
              Parental Control , Track what your children are doing.
              Business Administration , Monitor what employees are doing.
              School/Institutions , for students
              Personal Control and File Backup , Make sure no one is using your computer when you are away.
              Other Noble Purposes
          Default logins : admin , admin

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By Adam Garber

          Hidden Content
          Give reaction to this post to see the hidden content.  
          Dear members!





          We are pleased to offer you our service for providing VDS and dedicated servers for a wide range of tasks around the world!
          Our sales and customer support specialists are ready to answer any of your questions regarding the services provided.

          Who we are: a professional team that provides VDS / VPS hosting and ar dedicated servers.
          In almost all data centers, we have our own racks in which our servers are located.
          Experience in this area for about 4 years.

          Our servers are ideally suited for any tasks requiring increased anonymity and stability. Including Pentest and any related software.
          Technical support is ON-LINE 24 hours a day (through tickets on the website) and are ready to come to your aid in resolving issues on servers, VDS / VPS within their competence.
          All prices, countries and other additional information you can get on our website in the TOR.

          To order services, use our site in the TOR (via TOR-browser):


          Hidden Content
          Give reaction to this post to see the hidden content.

          Terms of Service (TOS):

          What is strictly forbidden to be placed on our servers, regardless of their physical location:

          1. Any content whose purpose is to cause direct or indirect harm (damage) to the Russian Federation and CIS countries.
          2. Any content in one way or another related to terrorism or the financing of terrorism (extremism).
          3. Any content containing pornographic material (except in countries where this is officially permitted by local laws).
          4. Child porn is prohibited in any form and is punishable by the immediate shutdown of the server without a refund and backups.
          5. Any content related to the sale or distribution of narcotic drugs or their precursors, as well as propaganda for the distribution of these drugs.
          6. Any type of illegal activity against government / financial networks and institutions, regardless of country.
          7. Posting content for the purpose of selling or distributing weapons and explosives.
          8. The boorish attitude towards the employees of our service may lead to a denial of service.


          - The client is responsible for the content that he places on the server and for the possible consequences of its use.
          - All our servers are provided without administration. You get full access and use the server as you see fit.
          - The client himself must monitor the backups on his server (s), in the event of a hard disk failure or any other circumstances of force majeure, our service will not reimburse
          - You do not have any direct or indirect losses that could arise as a result of a hard drive failure for any of the reasons.
          - Our task is to change your HDD for a new one, and we will do this in the shortest possible time, but we won’t bear it for the lost profit due to the failure of it.
          - Payment for services is made for 1 calendar month (minimum period), we do not rent equipment weekly and do not return MoneyBack if you personally want to cancel the services ahead of schedule.
          - Payment for services is accepted exclusively in BTC.

          This agreement is a mini-offer and takes effect after you have completed the order and received the service.
          If you do not like any of our rules, just do not place an order.

          For any kind of advice regarding the purchase of services, please use our PRE-SALES contacts:

          telegram:  Hidden Content
          Give reaction to this post to see the hidden content.

          jabber (CONSULT): [email protected] OR consult[doT]exploit.im


          SUPPORT (24/7) jabber: [email protected]


          All orders and technical support are carried out exclusively through our website in the TOR:

          Hidden Content
          Give reaction to this post to see the hidden content.

          This top is for advertising purposes only, so we kindly ask you not to flood here, but to leave only feedback on the use of our services.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Ultimate SMS is a powerful, flexible and User friendly Bulk SMS Marketing Application. It’s also an all-in-one solution for your SMS marketing. It’s easy to use & install.
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Summary
          This is a simple script intended to perform a full recon on an objective with multiple subdomains
          Features
              Tools checker
              Google Dorks (based on deggogle_hunter)
              Subdomain enumeration (passive, resolution, bruteforce and permutations)
              Sub TKO (subjack and nuclei)
              Web Prober (httpx)
              Web screenshot (aquatone)
              Template scanner (nuclei)
              Port Scanner (naabu)
              Url extraction (waybackurls, gau, hakrawler, github-endpoints)
              Pattern Search (gf and gf-patterns)
              Param discovery (paramspider and arjun)
              XSS (Gxss and dalfox)
              Open redirect (Openredirex)
              SSRF checks (from m4ll0k/Bug-Bounty-Toolz/SSRF.py)
              Github Check (git-hound)
              Favicon Real IP (fav-up)
              JS Checks (LinkFinder, SecretFinder, scripts from JSFScan)
              Fuzzing (ffuf)
              Cors (Corsy)
              SSL Check (testssl)
              Interlace integration
              Custom output folder (default under Recon/target.com/)
              Run standalone steps (subdomains, subtko, web, gdorks...)
              Polished installer compatible with most distros
              Verbose mode
              Update tools script


          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content.