Detection & Monitoring
Tools that watch network traffic and system behavior for signs of intrusion
Hardening & Prevention
Tools and techniques that reduce your attack surface
Forensics & Incident Response
Tools for collecting, preserving, and analyzing evidence
Shell Utilities
Bash and command-line tools essential for security work
Detection and monitoring
These tools implement your detective controls — they do not stop attacks, but they tell you an attack is occurring or has occurred.Wireshark
Wireshark is a graphical network protocol analyzer. It captures packets on a live interface or reads from a saved.pcap file and decodes them into human-readable form.
- Inspect traffic for C2 (command-and-control) beacons
- Identify plaintext credentials transmitted over unencrypted protocols
- Reconstruct TCP streams to see what an attacker sent and received
Log analysis with grep and awk
System logs are your first source of evidence.grep lets you search them quickly.
Intrusion Detection: Snort / Suricata
Network IDS tools like Snort and Suricata inspect traffic in real time and match it against rule sets describing known attack patterns. They generate alerts (and, in IPS mode, block traffic) without requiring you to manually read every packet.Signature-based IDS catches known threats with high precision. Anomaly-based IDS can catch novel attacks but produces more false positives. Most production deployments use both.
Hardening and prevention
These are your preventive controls — they shrink the attack surface before an attacker can exploit it.Firewall configuration (iptables / nftables)
A firewall enforces a policy about which traffic is allowed in and out. Default-deny is the correct posture: block everything, then explicitly permit what is needed.Access control and least privilege
Run services under dedicated, unprivileged accounts:Patch management
Unpatched software is the most common vulnerability exploited in real attacks. Keep systems current:Multi-factor authentication (MFA)
MFA is one of the highest-value controls you can deploy. Even if an attacker obtains a valid password, they cannot authenticate without the second factor. Enforce MFA for:- All remote access (VPN, SSH, web-based admin panels)
- All privileged accounts
- All cloud console access
Forensics and incident response
These tools help you understand what happened after an incident. Always work on a forensic copy — never modify original evidence.dd — disk imaging
dd creates a bit-for-bit copy of a disk or partition, preserving deleted files and unallocated space that a normal file copy would miss.
Volatility — memory analysis
Volatility is the standard tool for analyzing memory dumps. It extracts running processes, open network connections, loaded modules, and injected code from a raw memory image.Autopsy — disk forensics
Autopsy is a graphical front-end for The Sleuth Kit that lets you browse a forensic disk image, recover deleted files, search for keywords, and build a timeline of filesystem activity. It is commonly used in CTF forensics challenges and real investigations alike.FTK Imager
FTK Imager (Windows) creates forensic images in standard formats (E01, AFF, raw) with built-in hash verification. It can also mount images as read-only virtual drives for analysis without modifying the source.Chain of custody
Document every action you take on evidence:Shell utilities
These commands are the building blocks of security work on Linux and macOS. Knowing them well makes everything else faster.Navigation and file management
| Action | Bash / Zsh | PowerShell equivalent |
|---|---|---|
| Print working directory | pwd | pwd |
| List files | ls -la | ls -Force |
| Change directory | cd /path | cd /path |
| Copy | cp src dst | cp src dst |
| Move / rename | mv src dst | mv src dst |
| Delete (recursive) | rm -rf dir/ | rm -Recurse -Force |
| Show manual | man command | help command |
Reading files
grep — searching file content
grep searches for patterns (including regular expressions) inside files. It is essential for log analysis.
find — locating files
find traverses a directory tree to locate files by name, type, permission, or modification time.
Regular expressions (regex)
grep, sed, and most security tools accept regex patterns. The most useful symbols:
| Symbol | Meaning |
|---|---|
. | Any single character |
* | Zero or more of the preceding |
+ | One or more of the preceding |
? | Zero or one of the preceding |
^ | Start of line |
$ | End of line |
[abc] | Any one of a, b, or c |
[^abc] | Any character except a, b, or c |
[a-z] | Any lowercase letter |
a|b | Match a or b |
Virtual machines with QEMU
QEMU lets you run virtual machines for safe malware analysis, CTF challenge environments, or testing firewall rules without risking your host system.For malware analysis, always run samples in an isolated VM with networking disabled (
-net none). Take a snapshot before execution so you can restore a clean state and repeat the experiment.