Linux Basics for Hackers

Linux Basics for Hackers

Getting Started with Networking, Scripting, and Security in Kali
by OccupyTheWeb
November 2018, 248 pp.
ISBN-13: 
978-1-59327-855-7

Order now and get early access to the PDF ebook!
(What's Early Access?)
(Which chapters are available now?)

Get 30% off with the coupon code EARLYBIRD

Download Chapter 8: Bash Scripting
Download the scripts from the book here

If you’re getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for Hackers is an excellent first step. Using Kali Linux, an advanced penetration testing distribution of Linux, you’ll learn the basics of using the Linux operating system and acquire the tools and techniques you’ll need to take control of a Linux environment.

First, you’ll learn how to install Kali on a virtual machine and get an introduction to basic Linux concepts. Next, you’ll tackle broader Linux topics like manipulating text, controlling file and directory permissions, and managing user environment variables. You’ll then focus in on foundational hacking concepts like security and anonymity and learn scripting skills with bash and Python. Practical tutorials and exercises throughout will reinforce and test your skills as you learn how to:

  • Cover your tracks by changing your network information and manipulating the rsyslog logging utility
  • Write a tool to scan for network connections, and connect and listen to wireless networks
  • Keep your internet activity stealthy using Tor, proxy servers, VPNs, and encrypted email
  • Write a bash script to scan open ports for potential targets
  • Use and abuse services like MySQL, Apache web server, and OpenSSH
  • Build your own hacking tools, such as a remote video spy camera and a password cracker

Hacking is complex, and there is no single way in. Why not start at the beginning with Linux Basics for Hackers?

Covers Kali Linux and Python 3

Author Bio 

OccupyTheWeb is an infosec consultant, forensic investigator, and trainer with more than 20 years in the industry. He maintains the Hackers-Arise training site (https://www.hackers-arise.com) and trains US military personnel, Department of Defense contractors, and federal employees in information security and hacking.

Table of contents 

Chapter 1: Getting Started with the Basics
Chapter 2: Text Manipulation
Chapter 3: Analyzing and Managing Networks
Chapter 4: Adding and Removing Software
Chapter 5: Controlling File and Directory Permissions
Chapter 6: Process Management
Chapter 7: Managing User Environment Variables
Chapter 8: Bash Scripting
Chapter 9: Compressing and Archiving
Chapter 10: Filesystem and Storage Device Management
Chapter 11: The Logging System
Chapter 12: Using and Abusing Services
Chapter 13: Security and Anonymity
Chapter 14: Wireless Networking
Chapter 15: Linux Kernel and Drivers
Chapter 16: Startup Scripts
Chapter 17: Python Scripting Basics

View the detailed Table of Contents
View the Index