Skip to content
  • About
  • About Me
  • Blogs
  • Home
  • My Journey
  • Privacy Policy
YouTube
Krish
Growing Hacker
  • Home
  • Blogs
  • About
  • My Journey
  • Privacy Policy
YouTube
Krish
Growing Hacker

Series: Linux Basics For Hackers

In this series of Articles, we will learn about the basics of Kali Linux. We will start from the ground so anyone can easily follow up the series and learn something new.

Learn Find Now : The Boss of Searching in Linux !!

This entry is part 11 of 20 in the series Linux Basics For Hackers

Learn how to master the find command in Linux with advanced flags like -user, -exec, and how to pair it with the file command. Perfect for ethical hackers in Hindi.

System Information 1

Information Gathering in Linux | Part 1

This entry is part 12 of 20 in the series Linux Basics For Hackers

Learn how to gather system-level details in Linux using commands like whoami, id, hostname, uname, ifconfig, ip, and netstat. Ideal for beginners in ethical hacking!

System Information 2

Information Gathering in Linux | Part 2

This entry is part 13 of 20 in the series Linux Basics For Hackers

Take your Linux information gathering skills to the next level! Learn to use ss, ps, who, and w to uncover running processes, active users, and network connections. Essential for any hacker.

System Information 3

Information Gathering in Linux | Part 3

This entry is part 14 of 20 in the series Linux Basics For Hackers

Dive into Information Gathering in Linux with System Information Part-3. Learn to explore devices, processes, and more with lsblk, lsusb, lspci, and lsof.

Pagers and More in Linux | Filtering Content Part 1

This entry is part 15 of 20 in the series Linux Basics For Hackers

Struggling with massive text files in the Linux terminal? Learn the essentials of filtering content in Linux using more, less, head, and tail. The first crucial step for any aspiring hacker.

Sorting, Slicing and More… in Linux | Filtering Content Part 2

This entry is part 16 of 20 in the series Linux Basics For Hackers

Go beyond just viewing text and master filtering content in Linux by learning to sort, cut, count, and transform output like a pro.

Learn Now : Filtering Content in Linux with Awk and Sed

This entry is part 17 of 20 in the series Linux Basics For Hackers

Master advanced filtering content in Linux! Part 3 of our hacker series dives deep into the powerful awk and sed commands to manipulate text data like a pro.

Gather the URLs : Challenge 2

This entry is part 18 of 20 in the series Linux Basics For Hackers

I haven’t given you a challenge in a while, right? So, its time you put your learning into actions and do some real-world stuff !!

Learning The Basics of Permissions in Linux is Important

This entry is part 19 of 20 in the series Linux Basics For Hackers

You would never want anyone to have excess permissions to your private stuff, right? So, in this part, we are going to see what is meant by permissions in Linux.

User Management in Linux: Everything You Need to Know ?

This entry is part 20 of 20 in the series Linux Basics For Hackers

User Management in Linux is a crucial concept to master for maintaining security. In this article we are going to learn everything necessary for managing users in Linux.

Posts pagination

Previous 1 2

Hacking

How Malicious Chrome Extensions Exposed 900K Users This December ?

Over 900k users were hit by malicious Chrome extensions posing as ChatGPT and DeepSeek tools. We dive deep into the analysis, the C2 exfiltration, and how to secure your browser....

Read More

What is ADB and How To Install it in Windows and Linux ?

adb stands for Android Debug Bridge by which you can get root access to your phone terminal. So lets see how you can install it...

Read More

What is MBR, it's Working and Hacking !!

MBR or Master Boot Record is a partition scheme that has been used for decades. In this blog we will see MBR structure, history and hacking possibilities....

Read More

Cyber Security

What's Next? Leveraging Your Cyber Security Home Lab for Mastery

Congratulations! If you are reading this, you have likely finished setting up your cyber security home lab....

Read More

How to Install WSL and Docker For Cyber Security Homelab ?

In this part, we are going to install WSL and Docker on our machine. If you don't have a high-configuration computer at your hands,...

Read More

How To Create Your First Virtual Machine In 2025?

In this blog, I'm going to show you how you can create your first virtual machine with VMware. At first, the virtualization concept and the thought of creating your first...

Read More

Hacking Journey

I Changed My Whole Life in 6 Months

Wanted to share my personal update, so here I am with another self blog. It's been 6 months since I wrote an update about my journey,...

Read More

The Beginning

This is my first blog of my journey which I am sharing with you.So, till this point, I have started a YouTube channel named Growing HackerAs you can see above...

Read More
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}