Detection & Monitoring
Tools for watching your systems and networks in real time. Covers log analysis commands (
grep, awk), network sniffers, and intrusion detection systems (IDS). Use these tools to spot suspicious activity before it becomes a breach.Vulnerability Scanning
Tools for discovering weaknesses in your systems before attackers do. Covers network scanners (
nmap), web application scanners (nikto, OWASP ZAP), and full-featured assessment platforms (OpenVAS, Nessus). Also explains CVE/CVSS scoring.Attack Prevention & Hardening
Techniques and commands to reduce your attack surface. Includes firewall configuration, access control commands, file permission hardening, and secure coding principles.
Forensics & Incident Response
Tools used after an incident to understand what happened. Covers disk imaging (
dd), memory analysis (Volatility), file-system forensics (Autopsy), and packet capture analysis (Wireshark).Basic Bash Commands
Core shell commands every security practitioner needs. Covers navigation, file management, text searching (
grep, find), and regular expressions — with security-relevant examples.Setup & Config
Environment and lab configuration. Covers virtual machine setup, enabling hardware virtualization, and spinning up isolated test environments for safe experimentation.
How the categories relate
- Basic Bash Commands — foundational shell literacy needed across every other category.
- Setup & Config — isolated lab environments where you can practice safely without risk to production systems.
Choosing the right tool
I want to find open ports on a target
I want to find open ports on a target
Use nmap from the Vulnerability Scanning category. It identifies open ports, service versions, and can run scripts to check for known vulnerabilities.
I want to watch network traffic live
I want to watch network traffic live
Use Wireshark (or
tcpdump on the command line) from the Detection & Monitoring category to capture and inspect packets.I want to search system logs for suspicious events
I want to search system logs for suspicious events
Use grep or awk from Detection & Monitoring. Combine with
tail -f to watch logs in real time.I want to analyze a disk image after an incident
I want to analyze a disk image after an incident
Use Autopsy or Volatility covered in Incident Response. Create a forensic image first with
dd to preserve evidence integrity.I want to harden a Linux system
I want to harden a Linux system
Start with Security Tools: configure your firewall (UFW/iptables), review file permissions (SUID/SGID bits), and apply the principle of least privilege.