Linux Basics for Hackers

Linux Basics for Hackers

Linux Basics for Hackers

by 
OccupyTheWeb
ISBN-13: 
978-1-59327-855-7
June 2018, 248 pp.

Order now and get early access to the PDF ebook!
(What’s Early Access?)
(Which chapters are available now?)

Get 30% off with the coupon code EARLYBIRD

Many aspiring hackers are unfamiliar with Linux, having learned computer basics in a Windows or Mac environment. This can pose the single most important obstacle to mastering the skills to becoming a better hacker; while hacking can be done with Windows or OS X, nearly all hacking tools are developed specifically for Linux.

Linux Basics for Hackers aims to provide you with a foundation of Linux skills that every hacker needs. You’ll learn the advantages of Linux over other operating systems for hacking purposes, then move into the brass tacks: command line basics, filesystems, networking, bash, package management, compressing and archiving, process management, logging, device storage, and the Linux kernel. This comprehensive guide also addresses MySQL and postgresql (the database system Metasploit runs on) and some Python scripting. As you progress, you’ll have access to numerous real-world examples and hands-on exercises to apply your new knowledge and bring yourself up to speed.

Author Bio 

OccupyTheWeb is an infosec consultant, forensic investigator, and trainer with over 20 years in the industry. He formerly wrote the Null Byte column on www.wonderhowto.com, and presently runs https://www.hackers-arise.com. In addition, he trains the U.S. military, Department of Defense contractors, and federal employees in information security and hacking.

Table of contents 

Chapter 1: Getting Started
Chapter 2: Text Manipulation
Chapter 3: Analyzing and Managing Networks
Chapter 4: Adding and Removing Software
Chapter 5: File and Directory Permissions
Chapter 6: Process Management
Chapter 7: Managing User Environment Variables
Chapter 8: Bash Basics
Chapter 9: Compressing and Archiving
Chapter 10: Security
Chapter 11: Storage Device and Device Files
Chapter 12: Logging
Chapter 13: Hacker Key Services
Chapter 14: Staying Safe
Chapter 15: Linux Kernel and Drivers
Chapter 16: Startup Scripts
Chapter 17: Basic Python Scripting