SELECT A LESSON TO BEGIN
Master the OS that powers 90% of the internet. Read the theory. Run the commands. Own the system.
READ · UNDERSTAND · INTERNALIZE — THEN HEAD TO THE LABS
Navigate the hierarchy that controls everything. Inodes, permissions, mount points, and the hidden structures that make Linux tick from the ground up.
Own the system by understanding who owns what. SUID, SGID, sticky bits, ACLs, sudoers — the gatekeeping mechanisms and how to work with them.
Write scripts that execute your will. Loops, conditionals, functions, regex, and the art of piping data through a chain of commands like a pro.
Scan, probe, and map any network. Master netstat, ss, nmap, tcpdump, and understand how data moves through the layers beneath you.
See what's running in the dark. Control, kill, and resurrect processes. Understand cron jobs, systemd, and background daemon management.
Leave no trace — or find theirs. Parse system logs, analyze auth events, use grep and awk to extract signals from terabytes of noise.
COMPLETE THE MODULE FIRST — THEN EXECUTE WHAT YOU LEARNED
Navigate the Linux filesystem using real commands. Locate hidden files, inspect inodes, and use find to hunt SUID binaries like a penetration tester.
Set and exploit file permissions. Create SUID binaries, configure sudo rules, and understand where misconfigurations lead to privilege escalation.
Write a functional recon script from scratch. Variables, loops, functions, argument parsing, and output formatting all in the live terminal.
Discover live hosts, identify open ports, and extract service versions using nmap and ss. Practice the core recon workflow from every engagement.
Monitor running processes, analyze open file descriptors, set up cron jobs, and understand what systemd services are running on startup.
Analyze auth logs, extract attacker IPs, build grep+awk pipelines to surface anomalies from system noise. Real forensics in the terminal.
Each Lab drops you into an in-browser terminal simulator. Run real commands, receive realistic output, complete objectives, and unlock the next stage.
Navigate the shell, understand the filesystem, manipulate files and text. Foundation of everything.
Master users, groups, permissions, and understand privilege escalation vectors.
Build bash tools, automate recon, master text processing pipelines with grep, awk, and sed.
Map networks, understand TCP/IP, scan services, capture and analyze live traffic.
Kernel internals, memory forensics, binary analysis, and system hardening.