Now, Let’s move to topic of cybersecurity roadmap👇
⚡ Basic Linux Commands Every Hacker Must Know
In Linux, the terminal is everything.
Cybersecurity professionals use commands daily for:
- Navigating files
- Managing systems
- Running security tools
🖥️ 1️⃣ pwd → Present Working Directory
👉 Shows your current location
pwd
💡 Example Output:
/home/kali
📂 2️⃣ ls → List Files & Folders
👉 Shows files in current directory
ls
Useful variations:
ls -l
ls -a
-l → detailed view
-a → hidden files
📁 3️⃣ cd → Change Directory
👉 Move between folders
cd Documents
Go back one folder:
cd ..
📄 4️⃣ cat → View File Content
👉 Displays content of a file
cat notes.txt
✍️ 5️⃣ touch → Create File
touch test.txt
📂 6️⃣ mkdir → Create Folder
mkdir projects
❌ 7️⃣ rm → Remove Files/Folders
Delete file:
rm test.txt
Delete folder:
rm -r projects
⚠️ Warning: Be careful — deleted files usually cannot be recovered easily
👤 8️⃣ whoami → Current User
whoami
Shows logged-in username
🔥 9️⃣ clear → Clean Terminal
clear
🛡️ Why These Commands Matter in Cybersecurity
Hackers and security professionals use them for:
- Exploring systems
- Managing tools
- Accessing logs
- Automating tasks
👉 These are the foundation before advanced hacking tools
🎯 Mini Practice Challenge
Try this sequence 👇
mkdir cyberlab
cd cyberlab
touch notes.txt
ls
cat notes.txt
Goal:
- Create folder
- Enter folder
- Create file
- List files
- Read file
📝 Quick Task
Practice these commands for 15–20 minutes today until comfortable.