Linux Basics for Hackers, 2nd Edition cover

Linux Basics for Hackers, 2nd Edition

by OccupyTheWeb
July 2025, 264 pp.
ISBN-13: 
9781718503540
Covers Kali Linux and Python 3
Use coupon code PREORDER to get 25% off!

Download Chapter 8: Bash Scripting

Look Inside!

Linux Basics for Hackers, 2nd Edition back cover
Linux Basics for Hackers, 2nd Edition pages 44-45Linux Basics for Hackers, 2nd Edition pages 78-79Linux Basics for Hackers, 2nd Edition pages 140-141

If you’re just getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for Hackers is an excellent introduction. With Kali Linux, an operating system designed for digital forensics and penetration testing, you’ll learn the basics of using Linux and acquire the tools and techniques you’ll need to take control of a Linux environment.

First, you’ll learn how to install Kali on a virtual machine and get an introduction to basic Linux concepts. Next, you’ll tackle broader Linux topics like manipulating text, controlling file and directory permissions, and managing user environment variables. You’ll then focus on foundational hacking concepts like security and anonymity and learn scripting skills with bash and Python. 

Practical tutorials and exercises throughout will reinforce and test your skills as you learn how to:

  • Cover your tracks by changing your network information and manipulating the journalctl logging utility
  • Write a tool to scan for network connections, and connect and listen to wireless networks
  • Keep your internet activity stealthy using Tor, proxy servers, VPNs, and encrypted email
  • Write a bash script to find potential attack targets over a range of IP addresses
  • Use and abuse services like MySQL, the Apache web server, and OpenSSH
  • Build your own hacking tools, such as remote spy cameras and password crackers

New to this edition: This second edition has been updated to address recent changes to Kali  and Linux, including a more secure approach to  root privileges, updates to Bluetooth and Linux logging functions, and a new chapter with advice on AI in cybersecurity.

Hacking is complex, and there is no single way in. Why not start at the beginning with Linux Basics for Hackers?

Author Bio 

OccupyTheWeb (OTW)  is an infosec consultant, forensic investigator, and trainer with more than 20 years in the industry. He maintains the Hackers Arise training site (hackers-arise.com) and trains US military personnel, Department of Defense contractors, and federal employees in information security and hacking.

Table of contents 

Acknowledgments 
Preface
Introduction
Chapter 1: Getting Started with the Basics
Chapter 2: Text Manipulation
Chapter 3: Analyzing and Managing Networks
Chapter 4: Adding and Removing Software
Chapter 5: Controlling File and Directory Permissions
Chapter 6: Process Management
Chapter 7: Managing User Environment Variables
Chapter 8: Bash Scripting
Chapter 9: Compressing and Archiving
Chapter 10: Filesystem and Storage Device Management
Chapter 11: The Logging System
Chapter 12: Using and Abusing Services
Chapter 13: Becoming Secure and Anonymous
Chapter 14: Understanding and Inspecting Wireless Networks
Chapter 15: Managing the Linux Kernel and Loadable Kernel Modules
Chapter 16: Automating Tasks with Job Scheduling
Chapter 17: Python Scripting Basics for Hackers
Chapter 18: Artificial Intelligence for Hackers

Index

The chapters in red are included in this Early Access PDF.