LEADER 03514nam 2200445 i 4500
006 m o d |
007 cr cnu||||||||
008 190216s2019 cau o 000 0 eng d
a| MiAaPQ b| eng e| rda e| pn c| MiAaPQ d| MiAaPQ
a| QA76.9.A25 b| .O238 2019
a| 005.8092 2| 23
a| OccupyTheWeb, e| author.
a| Linux basics for hackers : b| getting started with networking, scripting, and security in Kali / c| by OccupyTheWeb.
a| 1st edition
a| San Francisco : b| No Starch Press, c| 
a| 1 online resource (250 pages)
a| text b| txt 2| rdacontent
a| computer b| c 2| rdamedia
a| online resource b| cr 2| rdacarrier
a| text file
a| Description based on print version record.
a| Includes index.
a| Getting started with the basics -- Text manipulation -- Analyzing and managing networks -- Adding and removing software -- Controlling file and directory permissions -- Process management -- Managing user environment variables -- Bash scripting -- Compressing and archiving -- Filesystem and storage device management -- The logging system -- Using and abusing services -- Becoming secure and anonymous -- Understanding and inspecting wireless networks -- Managing the Linux Kernel and loadable Kernel models -- Automating tasks with job scheduling -- Python scripting basics for hackers.
a| If you’re getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for Hackers is an excellent first step. Using Kali Linux, an advanced penetration testing distribution of Linux, you’ll learn the basics of using the Linux operating system and acquire the tools and techniques you’ll need to take control of a Linux environment. First, you’ll learn how to install Kali on a virtual machine and get an introduction to basic Linux concepts. Next, you’ll tackle broader Linux topics like manipulating text, controlling file and directory permissions, and managing user environment variables. You’ll then focus in on foundational hacking concepts like security and anonymity and learn scripting skills with bash and Python. Practical tutorials and exercises throughout will reinforce and test your skills as you learn how to: •Cover your tracks by changing your network information and manipulating the rsyslog logging utility •Write a tool to scan for network connections, and connect and listen to wireless networks •Keep your internet activity stealthy using Tor, proxy servers, VPNs, and encrypted email •Write a bash script to scan open ports for potential targets •Use and abuse services like MySQL, Apache web server, and OpenSSH •Build your own hacking tools, such as a remote video spy camera and a password cracker Hacking is complex, and there is no single way in. Why not start at the beginning with Linux Basics for Hackers? Covers Kali Linux and Python 3
a| Kali Linux.
a| Penetration testing (Computer security)
a| Electronic books.