Linux is widely used in cybersecurity because it supports powerful open-source tools for network scanning, monitoring, and penetration testing. This module introduces some essential tools for beginners and how to use them ethically.
Reconnaissance tools are used to gather information about networks, systems, and services.
Common tasks include:
Examples of tools:
⚠️ Note: Reconnaissance should always be performed on networks you own or have explicit permission to test. Unauthorized scanning is illegal.
On Debian-based systems (Ubuntu, Kali, Parrot OS):
sudo apt update
sudo apt install nmap wireshark netcat
On Red Hat-based systems:
sudo yum install nmap wireshark nc
After installation, you can run these tools from the terminal.
Nmap is a versatile network scanning tool.
Scan a single IP:
nmap 192.168.1.10
Scan a range of IPs:
nmap 192.168.1.1-20
Scan for specific ports:
nmap -p 22,80,443 192.168.1.10
Scan with service and OS detection:
nmap -sV -O 192.168.1.10
Wireshark captures and analyzes network traffic.
Start Wireshark GUI:
wireshark
Start capture from terminal (tshark):
sudo tshark -i eth0
Wireshark is essential for network monitoring, incident response, and troubleshooting.
Netcat is a flexible networking tool.
Check if a port is open:
nc -zv 192.168.1.10 22
-z → scan without sending data-v → verbose outputCreate a simple chat between two hosts:
# Host 1
nc -l 1234
# Host 2
nc 192.168.1.10 1234
Using cybersecurity tools ethically is critical:
🔒 Ethical usage ensures your skills are used for defense and learning, not illegal hacking.
Students should now understand: