Linux Basics for Hackers - 2nd Edition

Price:
Sale price £31.90
Stock:
Only 5 units left
Quantity:

Awesome Extras

Raspberry Pi 5 Starter Kit by The Pi Hut - The Pi HutRaspberry Pi 5 Starter Kit by The Pi Hut - The Pi Hut
The Pi HutRaspberry Pi 5 Starter Kit
Sale priceFrom £78.50 incl. VAT excl. VAT
Raspberry Pi Keyboard & Mouse by Raspberry Pi - The Pi HutRaspberry Pi Keyboard & Mouse by Raspberry Pi - The Pi Hut
Raspberry PiRaspberry Pi Keyboard & Mouse
Sale priceFrom £7.70 incl. VAT excl. VAT
Raspberry Pi Monitor by Raspberry Pi - The Pi HutRaspberry Pi Monitor by Raspberry Pi - The Pi Hut
Raspberry PiRaspberry Pi Monitor
Sale price £96 incl. VAT excl. VAT

If you’re just getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for Hackers is an excellent introduction. With Kali Linux, an operating system designed for digital forensics and penetration testing, you’ll learn the basics of using Linux and acquire the tools and techniques you’ll need to take control of a Linux environment (Kali runs on a Raspberry Pi too!).

First, you’ll learn how to install Kali on a virtual machine and get an introduction to basic Linux concepts. Next, you’ll tackle broader Linux topics like manipulating text, controlling file and directory permissions, and managing user environment variables. You’ll then focus on foundational hacking concepts like security and anonymity and learn scripting skills with bash and Python.

Practical tutorials and exercises throughout will reinforce and test your skills as you learn how to:

  • Cover your tracks by changing your network information and manipulating the journalctl logging utility
  • Write a tool to scan for network connections, and connect and listen to wireless networks
  • Keep your internet activity stealthy using Tor, proxy servers, VPNs, and encrypted email
  • Write a bash script to find potential attack targets over a range of IP addresses
  • Use and abuse services like MySQL, the Apache web server, and OpenSSH
  • Build your own hacking tools, such as remote spy cameras and password crackers
  • New to this edition: This second edition has been updated to address recent changes to Kali and Linux, including a more secure approach to root privileges, updates to Bluetooth and Linux logging functions, and a new chapter with advice on AI in cybersecurity.

Hacking is complex, and there is no single way in. Why not start at the beginning with Linux Basics for Hackers?

Author Bio

OccupyTheWeb (OTW) is an infosec consultant, forensic investigator, and trainer with more than 20 years in the industry. He maintains the Hackers Arise training site and trains US military personnel, Department of Defence contractors, and federal employees in information security and hacking.

Table of contents

Acknowledgments
Preface
Introduction
Chapter 1: Getting Started with the Basics
Chapter 2: Text Manipulation
Chapter 3: Analysing and Managing Networks
Chapter 4: Adding and Removing Software
Chapter 5: Controlling File and Directory Permissions
Chapter 6: Process Management
Chapter 7: Managing User Environment Variables
Chapter 8: Bash Scripting
Chapter 9: Compressing and Archiving
Chapter 10: File system and Storage Device Management
Chapter 11: The Logging System
Chapter 12: Using and Abusing Services
Chapter 13: Becoming Secure and Anonymous
Chapter 14: Understanding and Inspecting Wireless Networks
Chapter 15: Managing the Linux Kernel and Loadable Kernel Modules
Chapter 16: Automating Tasks with Job Scheduling
Chapter 17: Python Scripting Basics for Hackers
Chapter 18: Artificial Intelligence for Hackers
Index

Resources

Payment & Accreditations

Payment methods
Visa Mastercard Maestro PayPal Amazon Klarna Bitcoin

Your payment information is processed securely. We do not store credit card details nor have access to your credit card information.

Accreditations