Linux Basics for Hackers

Book description

If you’re getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for Hackers is an excellent first step. Using Kali Linux, an advanced penetration testing distribution of Linux, you’ll learn the basics of using the Linux operating system and acquire the tools and techniques you’ll need to take control of a Linux environment.

First, you’ll learn how to install Kali on a virtual machine and get an introduction to basic Linux concepts. Next, you’ll tackle broader Linux topics like manipulating text, controlling file and directory permissions, and managing user environment variables. You’ll then focus in on foundational hacking concepts like security and anonymity and learn scripting skills with bash and Python. Practical tutorials and exercises throughout will reinforce and test your skills as you learn how to:

•Cover your tracks by changing your network information and manipulating the rsyslog logging utility
•Write a tool to scan for network connections, and connect and listen to wireless networks
•Keep your internet activity stealthy using Tor, proxy servers, VPNs, and encrypted email
•Write a bash script to scan open ports for potential targets
•Use and abuse services like MySQL, Apache web server, and OpenSSH
•Build your own hacking tools, such as a remote video spy camera and a password cracker

Hacking is complex, and there is no single way in. Why not start at the beginning with Linux Basics for Hackers?

Covers Kali Linux and Python 3

Table of contents

  1. Cover Page
  2. Title Page
  3. Copyright Page
  4. Dedication
  5. About the Author
  6. About the Technical Reviewer
  7. BRIEF CONTENTS
  8. CONTENTS IN DETAIL
  9. ACKNOWLEDGMENTS
  10. INTRODUCTION
    1. What’s in This Book
    2. What Is Ethical Hacking?
    3. Why Hackers Use Linux
    4. Downloading Kali Linux
    5. Virtual Machines
    6. Setting Up Kali
  11. 1 GETTING STARTED WITH THE BASICS
    1. Introductory Terms and Concepts
    2. A Tour of Kali
    3. Basic Commands in Linux
    4. Finding Stuff
    5. Modifying Files and Directories
    6. Go Play Now!
    7. Exercises
  12. 2 TEXT MANIPULATION
    1. Viewing Files
    2. Filtering Text with grep
    3. Using sed to Find and Replace
    4. Viewing Files with more and less
    5. Summary
    6. Exercises
  13. 3 ANALYZING AND MANAGING NETWORKS
    1. Analyzing Networks with ifconfig
    2. Checking Wireless Network Devices with iwconfig
    3. Changing Your Network Information
    4. Manipulating the Domain Name System
    5. Summary
    6. Exercises
  14. 4 ADDING AND REMOVING SOFTWARE
    1. Using apt to Handle Software
    2. Adding Repositories to Your sources.list File
    3. Using a GUI-based Installer
    4. Installing Software with git
    5. Summary
    6. Exercises
  15. 5 CONTROLLING FILE AND DIRECTORY PERMISSIONS
    1. Different Types of Users
    2. Granting Permissions
    3. Checking Permissions
    4. Changing Permissions
    5. Setting More Secure Default Permissions with Masks
    6. Special Permissions
    7. Summary
    8. Exercises
  16. 6 PROCESS MANAGEMENT
    1. Viewing Processes
    2. Managing Processes
    3. Scheduling Processes
    4. Summary
    5. Exercises
  17. 7 MANAGING USER ENVIRONMENT VARIABLES
    1. Viewing and Modifying Environment Variables
    2. Changing Your Shell Prompt
    3. Changing Your PATH
    4. Creating a User-Defined Variable
    5. Summary
    6. Exercises
  18. 8 BASH SCRIPTING
    1. A Crash Course in Bash
    2. Your First Script: “Hello, Hackers-Arise!”
    3. Your Very First Hacker Script: Scan for Open Ports
    4. Common Built-in Bash Commands
    5. Summary
    6. Exercises
  19. 9 COMPRESSING AND ARCHIVING
    1. What Is Compression?
    2. Tarring Files Together
    3. Compressing Files
    4. Creating Bit-by-Bit or Physical Copies of Storage Devices
    5. Summary
    6. Exercises
  20. 10 FILESYSTEM AND STORAGE DEVICE MANAGEMENT
    1. The Device Directory /dev
    2. Mounting and Unmounting
    3. Monitoring Filesystems
    4. Summary
    5. Exercises
  21. 11 THE LOGGING SYSTEM
    1. The rsyslog Logging Daemon
    2. Automatically Cleaning Up Logs with logrotate
    3. Remaining Stealthy
    4. Summary
    5. Exercises
  22. 12 USING AND ABUSING SERVICES
    1. Starting, Stopping, and Restarting Services
    2. Creating an HTTP Web Server with the Apache Web Server
    3. OpenSSH and the Raspberry Spy Pi
    4. Extracting Information from MySQL/MariaDB
    5. Summary
    6. Exercises
  23. 13 BECOMING SECURE AND ANONYMOUS
    1. How the Internet Gives Us Away
    2. The Onion Router System
    3. Proxy Servers
    4. Virtual Private Networks
    5. Encrypted Email
    6. Summary
    7. Exercises
  24. 14 UNDERSTANDING AND INSPECTING WIRELESS NETWORKS
    1. Wi-Fi Networks
    2. Detecting and Connecting to Bluetooth
    3. Summary
    4. Exercises
  25. 15 MANAGING THE LINUX KERNEL AND LOADABLE KERNEL MODULES
    1. What Is a Kernel Module?
    2. Checking the Kernel Version
    3. Kernel Tuning with sysctl
    4. Managing Kernel Modules
    5. Summary
    6. Exercises
  26. 16 AUTOMATING TASKS WITH JOB SCHEDULING
    1. Scheduling an Event or Job to Run on an Automatic Basis
    2. Using rc Scripts to Run Jobs at Startup
    3. Adding Services to Your Bootup via a GUI
    4. Summary
    5. Exercises
  27. 17 PYTHON SCRIPTING BASICS FOR HACKERS
    1. Adding Python Modules
    2. Getting Started Scripting with Python
    3. Lists
    4. Modules
    5. Object-Oriented Programming (OOP)
    6. Network Communications in Python
    7. Dictionaries, Loops, and Control Statements
    8. Improving Our Hacking Scripts
    9. Exceptions and Password Crackers
    10. Summary
    11. Exercises
  28. INDEX

Product information

  • Title: Linux Basics for Hackers
  • Author(s): OccupyTheWeb .
  • Release date: December 2018
  • Publisher(s): No Starch Press
  • ISBN: 9781593278557