Practical Linux for Pentesting & Bug Bounties

Practical course to Linux Fundamentals for pentesting & bug bounties

   Watch Promo

What you'll learn

  • Linux Fundamentals
  • Linux vs Windows
  • Penetration Testing OS
  • Virtual Box
  • VMware
  • Boot Process
  • Password Management
  • Package Manager
  • Linux System Information
  • Linux Hardware Information
  • Performance Monitoring
  • User info and Management
  • File, Directory and Deletion
  • Directory Management
  • Rename, Move and Case Sensitive
  • Symbolic Links
  • File Reading
  • Process and Kill
  • Linux Permissions and Umask
  • Linux Network Management
  • Linux DHCP Server
  • Linux File System
  • Linux SAMBA Management
  • DNS Server Configuration
  • Hacker Challenge
  • Bash for Pentesting
  • Subdomain Enumeration Passive
  • Subdomain Enumeration Active
  • Identifying Live Subdomains using Bash
  • Subdomain Enumeration using wayback
  • JS Recon using Bash

Requirements

  • Basic IT Skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory & Internet Connection
  • Operating System: Windows / OS X / Linux

Description

Welcome to Linux for Pentesting & Bug Bounties Course. This course covers fundamentals of Linux and Bash scripting to write your own tools which can be useful for penetration testing and bug bounties. There is no prerequisite of prior linux knowledge and you will be able to install linux, understand fundamentals, write bash scripts for web attacks and mass automation.

This course helps any beginner to intermediate to understand linux fundamentals to make you comfortable with using linux and writing bash scripts tools.

This course will start from basic fundamentals of linux like - commands, directory structure, network management, archive management, linux file permissions, performance monitoring, userinfo management, input/output redirection, linux ip tables, virtual hosting and much more.

In addition to fundamentals of linux, you will also learn how to write your own tools in bash for Subdomain Enumeration - Active & Passive, Directory Fuzzers, CORS Automation, XSS Automation, Open Redirect Automation, Wayback using Bash etc.

This course is highly practical which helps you learn on exact environment when you start your penetrating testing or bug hunting journey.

This course also includes important interview questions and answers related to linux which will be helpful in any job interviews.

Here's a more detailed breakdown of the course content:

In all the sections we will start the fundamentals of Linux and Writing Bash Scripts to make our own useful tools.


In Introduction to Linux, we will cover What is Linux, Difference between Windows and Linux, Different Flavours of Linux and Tour to Penetration Testing OS like Kali Linux and Parrot OS.

We will see all the types of XSS attacks on live websites which will give you a better understanding of the live environment when you will start your bug hunting journey.

We will also cover Lab Setup for Installation of Linux in Virtual Box and VMware, We will also cover how to setup readymade virtual machine ova files as well which will save your time of installation.

Boot Process - Windows & Linux Boot Process,

Password Management - Breaking root password, Setting password for GRUB

Package Managers - yum, apt, brew, dpkg, rpm, chocolaty, searching for package, installing packages, removing packages, adding repositories, GUI Package managers, how to use git.

Linux Fundamentals - Linux System Information Commands, Linux Hardware Information Commands, Performance Monitoring Commands, User info and Management Commands, File, Directory and Deletion Commands, Directory Management Commands, Rename,Move and Case Sensitive Commands, Symbolic Links Commands, File Reading Commands, Process and Kill Commands, Background and Foreground Commands, Linux Permissions Fundamentals, Linux Network Management, Linux DHCP Server, What is DNS?, Linux Archive Management Commands, Linux Search and Pattern Commands, Linux SSH Management, Linux SAMBA Management, Linux File System Architecture, Linux IP tables, Web Servers, Virtual Hosts, Bash Scripting Basics, User Inputs, Bash Loops, Customising shell, Using Linux for recon,

Shell Scripting - We will create scripts/tools for Subdomain Brute force, CORS Automation, URLS to Domain, Waybackurls using Bash, HTTPX/ HTTProbe Tool using Bash, Open Redirect/SSRF and much more.

You will also get additional BONUS sessions, in which I m going to share my personal bash scripts for hunting bugs. I have also added Interview Questions and answers for linux which will be helpful for those are preparing for Job Interviews and Internships.

Notes:

  • This course is created for educational purposes only.
  • Testing any website which doesn’t have a Responsible Disclosure Policy is unethical and against the law, the author doesn’t hold any responsibility.

Who this course is for:

  • Anybody interested in learning Linux, Web application hacking / Penetration testing.
  • Any Beginner who wants to start using Linux for Penetration Testing
  • Any Beginner who wants to start with Bash Scripting for Automation of Bug Bounties
  • Trainer who are willing to start teaching Linux for Pentesting
  • Any Professional who working in Cyber Security and Pentesting
  • Ethical Hackers who wants to learn Linux Fundamentals
  • Beginners in Cyber Security Industry for Analyst Position
  • SOC person who is working into a corporate environment
  • Developers who wants to fix vulnerabilities and build secure applications


Your Instructor


Rohit Gautam
Rohit Gautam

I am Rohit Gautam the CEO & Founder of Hacktify Cyber Security

I am into Cyber Security Training for many years.

My students have been in the Top 15 Cyber Security Researchers of India twice in a Row.

Apart from training's, I'm a security researcher with special interest in network exploitation and web application security analysis and Red Teaming

I have worked for all the topmost banks of India in their VAPT Team.

I have worked with ICICI, Kotak, IDFC bank I have also experience working with NSDL and some financial organizations like Edelweiss

I have worked on many private projects with NTRO & Govt of India.

I was acknowledged with Swag, Hall of Fame, Letter Of Appreciation, and Monetary rewards by Google, Facebook, Conclusion, Seek, Trip Advisor, Riddlr, Hakon, Acorns, Faasos, and many more companies for finding out vulnerabilities in their organization and responsibly reporting it.


Join Today & Get Access To This Course & Every Resource You Need Grow Your Cyber Skills & Advance Your Career. Beginner & Expert Training.

Course Curriculum


  Training Overview
Available in days
days after you enroll
  Section 1: Introduction
Available in days
days after you enroll
  Section 2: Introduction to Linux
Available in days
days after you enroll
  Section 4: Boot Process
Available in days
days after you enroll
  Section 5: Password Management
Available in days
days after you enroll
  Section 7: Linux System Information
Available in days
days after you enroll
  Section 8: Linux Hardware Information
Available in days
days after you enroll
  Section 9: Performance Monitoring
Available in days
days after you enroll
  Section 10: Userinfo and Management
Available in days
days after you enroll
  Section 11: File, Directory and Deletion
Available in days
days after you enroll
  Section 12: Directory Management
Available in days
days after you enroll
  Section 13: Rename,Move and Case Sensitive
Available in days
days after you enroll
  Section 14: Symbolic Links
Available in days
days after you enroll
  Section 15: File Reading
Available in days
days after you enroll
  Section 16: Process and Kill
Available in days
days after you enroll
  Section 17: Background and Foreground
Available in days
days after you enroll
  Section 20: Linux Archive Management
Available in days
days after you enroll
  Section 21: Linux Search and Patterns
Available in days
days after you enroll
  Section 22: Linux SSH Management
Available in days
days after you enroll
  Section 23: Linux SAMBA Management
Available in days
days after you enroll
  Section 25: Snapshot
Available in days
days after you enroll
  Section 26: Writing Bash Script for Linux Permissions
Available in days
days after you enroll
  Section 27: Learning Linux System Command
Available in days
days after you enroll
  Section 28: Snapshot of Linux System Information
Available in days
days after you enroll
  Section 29: Learning Linux Performance Monitoring
Available in days
days after you enroll
  Audio Version of the Training
Available in days
days after you enroll

Frequently Asked Questions


When does the course start and finish?
The course starts now and never ends! It is a completely self-paced online course - you decide when you start and when you finish.
How long do I have access to the course?
How does lifetime access sound? After enrolling, you have unlimited access to this course for as long as you like - across any and all devices you own.
What if I am unhappy with the course?
We would never want you to be unhappy! If you are unsatisfied with your purchase, contact us in the first 30 days and we will give you a full refund.

Become A Member And Unlock Unlimited Access To This Course Plus Over 30,000+ Top Cyber Security Classes, Virtual Labs, Practice Tests, And Exam Simulations.

Designed To Help You Expand Your Skill Set And Propel Your Career Forward. Whether You're Just Starting Out Or You're An Industry Expert, There's Something Here For Everyone. Let's Grow Together!