Task 1 of 7

Why Hackers Live in the Terminal

Every serious security tool runs in a terminal. Nmap, sqlmap, ffuf, Burp Suite's CLI, Metasploit — none of them have nice GUIs you click through. The terminal is where the real work happens.

But beyond tooling, understanding the terminal means understanding the systems you're attacking. When you get command injection on a server, you need to know what to do once you have a shell. When you find a file inclusion bug, you need to know what files are worth reading. When you're doing recon, you need to automate things with scripts.

WHAT YOU WILL BE ABLE TO DO AFTER THIS COURSE
Navigate any Linux filesystem without getting lost
Read, search, and filter files from the command line
Understand file permissions and why they matter for privilege escalation
Chain commands together with pipes to build powerful one-liners
Make HTTP requests, check open ports, and enumerate a system from the shell

Linux — why not Windows?

Almost every server on the internet runs Linux. Web apps, databases, APIs, cloud infrastructure — Linux. When you compromise a system and get a shell, it will almost certainly be a Linux shell. Even the attack machines you use to run your tools from are Linux.

Windows matters too — Active Directory, Windows privilege escalation — but Linux is the foundation. Learn this first.

The shell

The program that interprets your commands is called a shell. The most common shell on Linux is bash (Bourne Again Shell). When you open a terminal on a Linux machine, you're running bash by default. You'll also encounter sh, zsh, and fish — but bash is what you need to know.

THE PROMPT
hackrgg:~$
hackrgg — your username
~ — your current directory (~ means home)
$ — you are a regular user (# means root)
1

What shell is the default on most Linux systems?

2

In the prompt `root@machine:~#` — what does the # symbol indicate?

Answer 2 questions to continue