𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Linux Basics for Hackers - Getting Started with Networking, Scripting, and Security in Kali

✍ Scribed by OccupyTheWeb


Publisher
No Starch Press, Inc
Year
2019
Tongue
English
Leaves
308
Edition
First edition.
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


LINUX BASICS FOR HACKERS. Copyright Β© 2019 by OccupyTheWeb.

LINUX BASICS FOR HACKERS
Getting Started with Networking, Scripting, and
Security in Kali
by OccupyTheWeb

About the Author
OccupyTheWeb (OTW) is the pseudonym for the founder and primary
writer for the hacker and pentester training website, https://www.hackersarise.
com/. He is a former college professor and has over 20 years of
experience in the information technology industry. He has trained
hackers throughout the US, including branches of the US military
(Army, Air Force, and Navy) and the US intelligence community (CIA,
NSA, and DNI). He is also an avid mountain biker and snow boarder.

Names: OccupyTheWeb, author.
Title: Linux basics for hackers : getting started with networking, scripting,
and security in Kali / OccupyTheWeb.
Description: First edition. | San Francisco : No Starch Press, Inc., [2018].
Identifiers: LCCN 2018030544 (print) | LCCN 2018032646 (ebook) | ISBN
9781593278564 (epub) | ISBN 159327856X (epub) | ISBN 9781593278557 (print)
| ISBN 1593278551 (print) | ISBN 9781593278564 (ebook) | ISBN 159327856X
(ebook)
Subjects: LCSH: Penetration testing (Computer security) | Kali Linux. |
Hackers. | Operating systems (Computers)

✦ Table of Contents


Title Page
Copyright Page
Dedication
About the Author
About the Technical Reviewer
BRIEF CONTENTS
CONTENTS IN DETAIL
ACKNOWLEDGMENTS
INTRODUCTION
What’s in This Book
What Is Ethical Hacking?
Why Hackers Use Linux
Downloading Kali Linux
Virtual Machines
Setting Up Kali
1 GETTING STARTED WITH THE BASICS
Introductory Terms and Concepts
A Tour of Kali
Basic Commands in Linux
Finding Stuff
Modifying Files and Directories
Go Play Now!
Exercises
2 TEXT MANIPULATION
Viewing Files
Filtering Text with grep
Using sed to Find and Replace
Viewing Files with more and less
Summary
Exercises
3 ANALYZING AND MANAGING NETWORKS
Analyzing Networks with ifconfig
Checking Wireless Network Devices with iwconfig
Changing Your Network Information
Manipulating the Domain Name System
Summary
Exercises
4 ADDING AND REMOVING SOFTWARE
Using apt to Handle Software
Adding Repositories to Your sources.list File
Using a GUI-based Installer
Installing Software with git
Summary
Exercises
5 CONTROLLING FILE AND DIRECTORY PERMISSIONS
Different Types of Users
Granting Permissions
Checking Permissions
Changing Permissions
Setting More Secure Default Permissions with Masks
Special Permissions
Summary
Exercises
6 PROCESS MANAGEMENT
Viewing Processes
Managing Processes
Scheduling Processes
Summary
Exercises
7 MANAGING USER ENVIRONMENT VARIABLES
Viewing and Modifying Environment Variables
Changing Your Shell Prompt
Changing Your PATH
Creating a User-Defined Variable
Summary
Exercises
8 BASH SCRIPTING
A Crash Course in Bash
Your First Script: β€œHello, Hackers-Arise!”
Your Very First Hacker Script: Scan for Open Ports
Common Built-in Bash Commands
Summary
Exercises
9 COMPRESSING AND ARCHIVING
What Is Compression?
Tarring Files Together
Compressing Files
Creating Bit-by-Bit or Physical Copies of Storage Devices
Summary
Exercises
10 FILESYSTEM AND STORAGE DEVICE MANAGEMENT
The Device Directory /dev
Mounting and Unmounting
Monitoring Filesystems
Summary
Exercises
11 THE LOGGING SYSTEM
The rsyslog Logging Daemon
Automatically Cleaning Up Logs with logrotate
Remaining Stealthy
Summary
Exercises
12 USING AND ABUSING SERVICES
Starting, Stopping, and Restarting Services
Creating an HTTP Web Server with the Apache Web Server
OpenSSH and the Raspberry Spy Pi
Extracting Information from MySQL
Summary
Exercises
13 BECOMING SECURE AND ANONYMOUS
How the Internet Gives Us Away
The Onion Router System
Proxy Servers
Virtual Private Networks
Encrypted Email
Summary
Exercises
14 UNDERSTANDING AND INSPECTING WIRELESS NETWORKS
Wi-Fi Networks
Detecting and Connecting to Bluetooth
Summary
Exercises
15 MANAGING THE LINUX KERNEL AND LOADABLE KERNEL MODULES
What Is a Kernel Module?
Checking the Kernel Version
Kernel Tuning with sysctl
Managing Kernel Modules
Summary
Exercises
16 AUTOMATING TASKS WITH JOB SCHEDULING
Scheduling an Event or Job to Run on an Automatic Basis
Using rc Scripts to Run Jobs at Startup
Adding Services to Your Bootup via a GUI
Summary
Exercises
17 PYTHON SCRIPTING BASICS FOR HACKERS
Adding Python Modules
Getting Started Scripting with Python
Lists
Modules
Object-Oriented Programming (OOP)
Network Communications in Python
Dictionaries, Loops, and Control Statements
Improving Our Hacking Scripts
Exceptions and Password Crackers
Summary
Exercises
INDEX

✦ Subjects


Operating systems; Kali Linux; Penetration testing; Hackers


πŸ“œ SIMILAR VOLUMES


Linux Basics for Hackers: Getting Starte
✍ OccupyTheWeb πŸ“‚ Library πŸ“… 2018 πŸ› No Starch Press 🌐 English

This practical, tutorial-style book uses the Kali Linux distribution to teach Linux basics with a focus on how hackers would use them. Topics include Linux command line basics, filesystems, networking, BASH basics, package management, logging, and the Linux kernel and drivers. If you're getting s

Linux Basics for Hackers: Getting Starte
✍ OccupyTheWeb πŸ“‚ Library πŸ“… 2018 πŸ› No Starch Press 🌐 English

<div><p><strong>This practical, tutorial-style book uses the Kali Linux distribution to teach Linux basics with a focus on how hackers would use them. Topics include Linux command line basics, filesystems, networking, BASH basics, package management, logging, and the Linux kernel and drivers.</stron

Linux Basics For Hackers: Getting Starte
✍ OccupyTheWeb πŸ“‚ Library πŸ“… 2018 πŸ› No Starch Press 🌐 English

This practical, tutorial-style book uses the Kali Linux distribution to teach Linux basics with a focus on how hackers would use them. Topics include Linux command line basics, filesystems, networking, BASH basics, package management, logging, and the Linux kernel and drivers. If you're getting star

Linux Basics for Aspiring Hackers: Getti
✍ OccupyTheWeb πŸ“‚ Library πŸ“… 2018;2019 πŸ› No Starch Press 🌐 English

<b>This practical, tutorial-style book uses the Kali Linux distribution to teach Linux basics with a focus on how hackers would use them. Topics include Linux command line basics, filesystems, networking, BASH basics, package management, logging, and the Linux kernel and drivers.</b><br>Many aspirin