<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Arashad Dodhiya</title>
    <description>The latest articles on Forem by Arashad Dodhiya (@arashad_dodhiya_0e4bdba5a).</description>
    <link>https://forem.com/arashad_dodhiya_0e4bdba5a</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3676094%2F44443da4-e92a-4c56-9139-54d04da1f682.jpg</url>
      <title>Forem: Arashad Dodhiya</title>
      <link>https://forem.com/arashad_dodhiya_0e4bdba5a</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/arashad_dodhiya_0e4bdba5a"/>
    <language>en</language>
    <item>
      <title>Linux for Cybersecurity: The Commands That Actually Matter (Reality Check)</title>
      <dc:creator>Arashad Dodhiya</dc:creator>
      <pubDate>Wed, 24 Dec 2025 04:17:08 +0000</pubDate>
      <link>https://forem.com/arashad_dodhiya_0e4bdba5a/linux-for-cybersecurity-the-commands-that-actually-matter-reality-check-3bkc</link>
      <guid>https://forem.com/arashad_dodhiya_0e4bdba5a/linux-for-cybersecurity-the-commands-that-actually-matter-reality-check-3bkc</guid>
      <description>&lt;p&gt;When I started learning cybersecurity, Linux felt overwhelming.&lt;/p&gt;

&lt;p&gt;People talk about &lt;em&gt;“master Linux”&lt;/em&gt; like you need to memorize hundreds of commands before you can do anything useful. That mindset almost made me quit early.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Reality:&lt;/strong&gt;&lt;br&gt;
You don’t need &lt;em&gt;all&lt;/em&gt; Linux commands.&lt;br&gt;
You need the &lt;strong&gt;right ones&lt;/strong&gt;, and you need to understand &lt;strong&gt;why they matter&lt;/strong&gt; from a security point of view.&lt;/p&gt;

&lt;p&gt;This post is a practical breakdown of the &lt;strong&gt;Linux commands that actually matter for cybersecurity beginners&lt;/strong&gt; — not for flexing in terminals, but for real understanding.&lt;/p&gt;


&lt;h2&gt;
  
  
  Navigation &amp;amp; File System (You Can’t Secure What You Can’t See)
&lt;/h2&gt;

&lt;p&gt;Before hacking anything, you need to know &lt;strong&gt;where things live&lt;/strong&gt;.&lt;/p&gt;
&lt;h3&gt;
  
  
  Commands that matter
&lt;/h3&gt;


&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;pwd
ls
cd
&lt;/span&gt;tree
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;h3&gt;
  
  
  Why this matters in security
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Config files, logs, credentials — everything is just files&lt;/li&gt;
&lt;li&gt;Attackers look for &lt;strong&gt;interesting locations&lt;/strong&gt;, not random commands&lt;/li&gt;
&lt;li&gt;You need to move fast and confidently inside unknown systems&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;
  
  
  Security mindset
&lt;/h3&gt;

&lt;blockquote&gt;
&lt;p&gt;If you don’t understand the Linux filesystem, you’ll never understand privilege escalation or misconfigurations.&lt;/p&gt;
&lt;/blockquote&gt;


&lt;h2&gt;
  
  
  Reading Files (Logs Are Gold)
&lt;/h2&gt;
&lt;h3&gt;
  
  
  Commands that matter
&lt;/h3&gt;


&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;cat
&lt;/span&gt;less
more
&lt;span class="nb"&gt;head
tail&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;h3&gt;
  
  
  Why this matters
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Logs reveal &lt;strong&gt;authentication attempts&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Config files reveal &lt;strong&gt;secrets and bad permissions&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;You’ll constantly inspect:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;code&gt;/etc/passwd&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;/etc/shadow&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;/var/log/auth.log&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;.env&lt;/code&gt; files&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;
  
  
  Pro tip
&lt;/h3&gt;


&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;tail&lt;/span&gt; &lt;span class="nt"&gt;-f&lt;/span&gt; /var/log/auth.log
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;


&lt;p&gt;This lets you &lt;strong&gt;watch logins in real time&lt;/strong&gt; — very useful for learning.&lt;/p&gt;


&lt;h2&gt;
  
  
  File Permissions &amp;amp; Ownership (This Is Where Most Vulnerabilities Live)
&lt;/h2&gt;
&lt;h3&gt;
  
  
  Commands that matter
&lt;/h3&gt;


&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;ls&lt;/span&gt; &lt;span class="nt"&gt;-l&lt;/span&gt;
&lt;span class="nb"&gt;chmod
chown
id
whoami&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;h3&gt;
  
  
  Why this matters
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Misconfigured permissions = easy privilege escalation&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;You must understand:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Read (&lt;code&gt;r&lt;/code&gt;)&lt;/li&gt;
&lt;li&gt;Write (&lt;code&gt;w&lt;/code&gt;)&lt;/li&gt;
&lt;li&gt;Execute (&lt;code&gt;x&lt;/code&gt;)&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Who owns what — and &lt;strong&gt;who shouldn’t&lt;/strong&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;
  
  
  Security example
&lt;/h3&gt;

&lt;p&gt;If a sensitive script is writable by everyone:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nt"&gt;-rwxrwxrwx&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;That’s a &lt;strong&gt;huge vulnerability&lt;/strong&gt;.&lt;/p&gt;




&lt;h2&gt;
  
  
  Searching for Interesting Files (Attackers Don’t Browse — They Search)
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Commands that matter
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;find
&lt;span class="nb"&gt;grep
&lt;/span&gt;locate
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h3&gt;
  
  
  Real use cases
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;find / &lt;span class="nt"&gt;-perm&lt;/span&gt; &lt;span class="nt"&gt;-4000&lt;/span&gt; 2&amp;gt;/dev/null
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;👉 Finds SUID binaries (very important for privilege escalation)&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;grep&lt;/span&gt; &lt;span class="nt"&gt;-R&lt;/span&gt; &lt;span class="s2"&gt;"password"&lt;/span&gt; /etc
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;👉 Finds hardcoded secrets (common beginner mistake)&lt;/p&gt;




&lt;h2&gt;
  
  
  Processes &amp;amp; Services (What’s Running = What Can Be Attacked)
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Commands that matter
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;ps
top
htop
systemctl
service
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h3&gt;
  
  
  Why this matters
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Running services expose &lt;strong&gt;attack surfaces&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Misconfigured services = easy targets&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;You need to see:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;What’s running&lt;/li&gt;
&lt;li&gt;Under which user&lt;/li&gt;
&lt;li&gt;With what permissions&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;/ul&gt;

&lt;h3&gt;
  
  
  Example
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;ps aux
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Shows &lt;strong&gt;everything running&lt;/strong&gt; — attackers love this.&lt;/p&gt;




&lt;h2&gt;
  
  
  Networking Basics (Your First Recon Tool Is Linux Itself)
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Commands that matter
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;ip a
ip route
ss
netstat
ping
curl
wget
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h3&gt;
  
  
  Why this matters
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Before Nmap, understand &lt;strong&gt;local networking&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Check:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;IP addresses&lt;/li&gt;
&lt;li&gt;Open ports&lt;/li&gt;
&lt;li&gt;Listening services
&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;/ul&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;ss &lt;span class="nt"&gt;-tuln&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;👉 Shows open ports without fancy tools&lt;/p&gt;




&lt;h2&gt;
  
  
  User &amp;amp; Login Information (Who Has Access?)
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Commands that matter
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;who
&lt;/span&gt;w
last
su
&lt;span class="nb"&gt;sudo&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h3&gt;
  
  
  Why this matters
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;See who’s logged in&lt;/li&gt;
&lt;li&gt;Identify admin users&lt;/li&gt;
&lt;li&gt;Detect suspicious activity
&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;last
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;👉 Shows login history (great for blue team learning)&lt;/p&gt;




&lt;h2&gt;
  
  
  Package Management (Attackers Love Outdated Software)
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Commands that matter
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;apt
apt update
apt upgrade
dpkg
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h3&gt;
  
  
  Why this matters
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Old packages = known vulnerabilities&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Knowing what’s installed helps:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Attackers find exploits&lt;/li&gt;
&lt;li&gt;Defenders patch systems&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;/ul&gt;




&lt;h2&gt;
  
  
  Commands You Don’t Need (At the Beginning)
&lt;/h2&gt;

&lt;p&gt;You can safely ignore (for now):&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Advanced shell scripting&lt;/li&gt;
&lt;li&gt;Kernel compilation&lt;/li&gt;
&lt;li&gt;Custom init systems&lt;/li&gt;
&lt;li&gt;Exotic filesystem tuning&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Learn depth, not breadth.&lt;/strong&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  Final Reality Check
&lt;/h2&gt;

&lt;p&gt;Cybersecurity Linux is not about:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Memorizing commands&lt;/li&gt;
&lt;li&gt;Showing off terminal tricks&lt;/li&gt;
&lt;li&gt;Using Kali tools blindly&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;It’s about:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Understanding systems&lt;/li&gt;
&lt;li&gt;Reading configurations&lt;/li&gt;
&lt;li&gt;Spotting mistakes&lt;/li&gt;
&lt;li&gt;Thinking like an attacker&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If you master &lt;strong&gt;these commands and the reasons behind them&lt;/strong&gt;, you’ll be far ahead of most beginners.&lt;/p&gt;




&lt;h2&gt;
  
  
  What I’m Doing Next
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Practicing on real labs&lt;/li&gt;
&lt;li&gt;Reading logs daily&lt;/li&gt;
&lt;li&gt;Breaking small systems safely&lt;/li&gt;
&lt;li&gt;Learning &lt;em&gt;why&lt;/em&gt; vulnerabilities exist&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If you’re learning cybersecurity too - slow down, learn Linux properly, and don’t chase tools too early.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>linux</category>
      <category>infosec</category>
      <category>learninginpublic</category>
    </item>
  </channel>
</rss>
