Linux Tutorials

Our Linux tutorials offer a systematic way to master the open - source operating system. They cover command - line operations, system administration, and shell scripting, suitable for both beginners and experienced users. With free labs and practical examples, you'll gain hands - on experience in Linux environments. Our interactive Linux playground allows you to practice commands and scripts in a simulated terminal.

Online Virtual Machines and Playgrounds

Online Virtual Machines and Playgrounds

LabEx provides a wide range of online virtual machines and playgrounds for various technologies, allowing you to learn and practice hands-on in a pre-configured environment.
Linux
Online Linux Terminal and Playground

Online Linux Terminal and Playground

LabEx provides an Online Linux Terminal and Playground, an online environment that allows you to quickly set up a Linux Terminal or Desktop environment.
Linux
Online Ubuntu Desktop & Terminal Playground

Online Ubuntu Desktop & Terminal Playground

LabEx provides an Online Ubuntu Playground, a comprehensive environment that allows you to quickly set up a full Ubuntu Desktop or a Linux Terminal for learning and experimentation.
Linux
Online Shell Terminal and Playground

Online Shell Terminal and Playground

LabEx provides an Online Shell Terminal and Playground, an online environment that allows you to quickly set up a Shell Terminal or Desktop environment.
Linux
Online Hydra Playground

Online Hydra Playground

LabEx provides an Online Hydra Playground, an online environment that allows you to quickly set up a Hydra testing environment for password cracking and brute-force testing.
Linux
Online Debian Playground & Environment

Online Debian Playground & Environment

LabEx provides an Online Debian Playground & Environment, an online environment that allows you to quickly set up a Debian Terminal or Desktop environment.
Linux
Online Fedora Playground & Environment

Online Fedora Playground & Environment

LabEx provides an Online Fedora Terminal and Playground, an online environment that allows you to quickly set up a Fedora Terminal or Desktop environment.
Linux
Online CentOS Playground & Environment

Online CentOS Playground & Environment

LabEx provides an Online CentOS Playground & Environment, an online environment that allows you to quickly set up a CentOS Terminal or Desktop environment.
Linux
Metasploit Basic Post-Exploitation

Metasploit Basic Post-Exploitation

In this lab, you will learn the basic post-exploitation techniques in Metasploit, including interacting with sessions, running shell commands, and transferring files.
Linux
Metasploit Simple Exploit Execution

Metasploit Simple Exploit Execution

In this lab, you will learn the basic workflow of exploiting a vulnerable service using the Metasploit Framework. You will target a known backdoor in VSFTPD 2.3.4 to gain a shell on the target system.
Linux
SSH Enumeration and Key-Based Access

SSH Enumeration and Key-Based Access

In this lab, you will learn to enumerate an SSH service using `nmap`, exploit a weak key-based authentication misconfiguration to gain shell access, and retrieve a flag. This exercise focuses on SSH security best practices.
Linux
HTTP Enumeration and Directory Traversal

HTTP Enumeration and Directory Traversal

In this lab, you will learn to perform HTTP service enumeration and exploit a directory traversal vulnerability. You'll use `nmap` to identify a web server, then use `curl` to read a restricted file outside the web root and capture the flag.
Linux
User Account Creation

User Account Creation

In this lab, you will learn the fundamental Linux commands for user account management, including creating, modifying, and deleting user accounts, and granting administrative privileges.
Linux
Rsync Enumeration and Anonymous Sync

Rsync Enumeration and Anonymous Sync

In this lab, you will learn to enumerate and exploit a misconfigured Rsync service. You'll use `nmap` to detect the service, connect anonymously to sync files from a remote target, and retrieve a flag, highlighting risks in backup synchronization services.
Linux
SMB Enumeration and Guest Access

SMB Enumeration and Guest Access

In this lab, you will learn to perform Server Message Block (SMB) enumeration. You'll use `nmap` to identify the SMB service, exploit a guest access misconfiguration with `smbclient`, and retrieve a flag from a shared directory, simulating a common network vulnerability.
Linux
RDP Enumeration and Weak Password Access

RDP Enumeration and Weak Password Access

In this lab, you'll enumerate Remote Desktop Protocol (RDP) services, identify vulnerabilities, and gain access using weak credentials. Use `nmap` for scanning, `xfreerdp` for connection, and retrieve a flag from the remote desktop session.
Linux
DAY 09: The Backup Sentinel

DAY 09: The Backup Sentinel

In this challenge, you'll act as a system administrator to master Linux backup and recovery, protecting critical data using `tar` and `cron`.
Linux
Telnet Brute Force and Weak Credentials

Telnet Brute Force and Weak Credentials

In this lab, you'll enumerate weak credentials for a Telnet service using a wordlist. You will scan with nmap, use hydra for a brute-force attack, and gain access to a target system to retrieve a flag, highlighting the risks of weak passwords.
Linux
  • Prev
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • ...
  • 138
  • Next