If you’re getting started along the exciting path of hacking, cybersecurity, and pentesting,Linux Basics for Hackersis an excellent first step. Using Kali Linux, an advanced penetration testing distribution of Linux, you’ll learn the basics of using the Linux operating system and acquire the tools and techniques you’ll need to take control of a Linux environment.
First, you’ll learn how to install Kali on a virtual machine and get an introduction to basic Linux concepts. Next, you’ll tackle broader Linux topics like manipulating text, controlling file and directory permissions, and managing user environment variables. You’ll then focus in on foundational hacking concepts like security and anonymity and learn scripting skills with bash and Python. Practical tutorials and exercises throughout will reinforce and test your skills as you learn how to:
Cover your tracks by changing your network information and manipulating the rsyslog logging utility
Write a tool to scan for network connections, and connect and listen to wireless networks
Keep your internet activity stealthy using Tor, proxy servers, VPNs, and encrypted email
Write a bash script to scan open ports for potential targets
Use and abuse services like MySQL, Apache web server, and OpenSSH
Build your own hacking tools, such as a remote video spy camera and a password cracker
Hacking is complex, and there is no single way in. Why not start at the beginning withLinux Basics for Hackers?
Covers Kali Linux and Python 3
Author Bio
OccupyTheWebis an infosec consultant, forensic investigator and trainer with more than 20 years in the industry. He maintains the Hackers-Arise training site and trains US military personnel, Department of Defense contractors, and federal employees in information security and hacking.
Table of contents
Chapter 1: Getting Started with the Basics Chapter 2: Text Manipulation Chapter 3: Analyzing and Managing Networks Chapter 4: Adding and Removing Software Chapter 5: Controlling File and Directory Permissions Chapter 6: Process Management Chapter 7: Managing User Environment Variables Chapter 8: Bash Scripting Chapter 9: Compressing and Archiving Chapter 10: Filesystem and Storage Device Management Chapter 11: The Logging System Chapter 12: Using and Abusing Services Chapter 13: Security and Anonymity Chapter 14: Wireless Networking Chapter 15: Linux Kernel and Drivers Chapter 16: Startup Scripts Chapter 17: Python Scripting Basics
Reviews
"The information provided can help even a general user to get more comfortable with the Linux operating system without feeling overwhelmed by more complex, security-related topics and usage. While we could all benefit from more attention to security, Linux Basics for Hackers just might inspire the next crop of budding techies into the security rock stars of tomorrow." —Tim Everson,The Ethical Hacker Network
"If you're just getting started or working your way to expert level, getting a copy of this book might be one of the best things you can do to develop your cybersecurity skills." —Sandra Henry-Stocker,Network World
"Linux Basics for Hackers is immediately practical. Its quick and dirty approach to exploring and using a Linux system was welcome."—Jesse Smith,DistroWatch Weekly
"If you are starting out in Computer Science and want to get up to speed quickly on Linux and Unix like operating systems, working through this book will put you well ahead of your fellow students, and quickly." —Greg Laden,Greg Laden's Blog
"A great guide for those who are not familiar with Linux as well as those who are proficient." —Davin Jackson,Alpha Cyber Security, Books to Start Your Penetration Testing Journey
"Linux Basics for Hackers is the best book for Jr. penetration testers and newbies who want to learn InfoSec. Though aimed at hacking, it's the best general intro to Linux I've read. Gives a great overview of Linux basics and useful terminal commands." —@hackerb0t
Updates
Page 7 The following text regarding moving up through directory levels is incorrect:
You would use .. to move up one level.
You would use .. .. to move up two levels.
You would use .. .. .. to move up three levels, and so on.
This text should read:
You would use .. to move up one level.
You would use ../.. to move up two levels.
You would use ../../.. to move up three levels, and so on.
Payment & Accreditations
Payment methods
Your payment information is processed securely. We do not store credit card details nor have access to your credit card information.
Accreditations
Overall product rating out of 5: 4.50
4.50
Based on 2 reviews
Write Review
Sort
Clear Filters
Order By
Newest First
Oldest First
Most Popular
Highest Rating
Breakdown
1
1
0
0
0
Product Reviews
DG
Verified Customer
Daniel G
Linux Basics for Hackers
A very good and insightful book. I read over half of the book in one sitting. I do think it could have benefited by having some historical accounts of hacks and perhaps a bit about the mindset involved. Overall, a good book.
This is a really good book. It's focused on Kali Linux; it can be used with other distributions especially the early chapters. The explanations are clear with expected terminal output shown in the text. This is a book for Linux beginners, however the author fits a lot of content into 203 pages. I personally found the chapters on Controlling File and Directory Permissions (Chapter 5) and Python Scripting (Chapter 17) particularly useful. You can see a good book preview on Google Books. The book came next day from ordering as well