Want to become a real hacker? Choose Linux please!2 min read

If you want to become a real hacker and seriously consider this as a job that you want to pursue. Skills and talent are really crucial. Besides that, Operating System is indispensable of part of this field. You can choose many operating systems which are OK such as Windows or MacOS to do that. But why Linux is still considered as the best OS for hacking by a ton of advice from experts? Let’s take a look.

Linux is a family of free and open-source software operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution. – Wikipedia.

The first step for any hacker would be to master the operating system of choice. To hack effectively, you must know and understand your operating system and to a large extent, the operating system you are attacking. Linux is totally transparent, meaning we can see and manipulate all its working parts. Linux is granular. That means that we have an almost infinite amount of control over the system. In Windows, you only can control what Microsoft allows you to control. In Linux, everything can be controlled by the terminal in the most minuscule to the most macro level. In addition, Linux makes scripting in any of the scripting languages simple and effective. Well over 90% of all hacking tools are written for Linux. Of course, there are exceptions like Cain and Abel and Havij, but those exceptions simply emphasize the rule. Even when hacking tools such as Metasploit or map are ported for Windows, not all the capabilities transfer from Linux.

To get started with network hacking, it’s highly recommended to get a Linux distro, of which Kali is most popular among hackers for various good reasons, more on Kali later on this page. However, if you’re up to e.g. game hacking or password cracking Windows does a good job, so it kind of depends on what you are exactly up to. Generally, Linux would be your choice for anything network related, such as WPA2 cracking or rerouting traffic/DNS and MITM (man in the middle) attacks.

If you want to learn more about hacking and also Linux OS, you can go to this blog to acquire practical knowledge. Click here. Thanks for reading!

Previous Article
Next Article

Sign up for newsletter

* indicates required

Categories

Archives