Linux Basics for Hackers, 2nd Edition. Getting Started with Networking, Scripting, and Security in Kali

Par :
Offrir maintenant
Ou planifier dans votre panier
Disponible dans votre compte client Decitre ou Furet du Nord dès validation de votre commande. Le format ePub est :
  • Compatible avec une lecture sur My Vivlio (smartphone, tablette, ordinateur)
  • Compatible avec une lecture sur liseuses Vivlio
  • Pour les liseuses autres que Vivlio, vous devez utiliser le logiciel Adobe Digital Edition. Non compatible avec la lecture sur les liseuses Kindle, Remarkable et Sony
Logo Vivlio, qui est-ce ?

Notre partenaire de plateforme de lecture numérique où vous retrouverez l'ensemble de vos ebooks gratuitement

Pour en savoir plus sur nos ebooks, consultez notre aide en ligne ici
C'est si simple ! Lisez votre ebook avec l'app Vivlio sur votre tablette, mobile ou ordinateur :
Google PlayApp Store
  • Nombre de pages264
  • FormatePub
  • ISBN978-1-7185-0355-7
  • EAN9781718503557
  • Date de parution01/07/2025
  • Protection num.pas de protection
  • Taille23 Mo
  • Infos supplémentairesepub
  • ÉditeurNo Starch Press

Résumé

A revised introduction to the Linux operating system for beginning hackers and penetration testers. If you're just getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for Hackers is an excellent introduction. With Kali Linux, an operating system designed for digital forensics and penetration testing, you'll learn the basics of using Linux and acquire the tools and techniques you'll need to take control of a Linux environment.
First, you'll learn how to install Kali on a virtual machine and get an introduction to basic Linux concepts. Next, you'll tackle broader Linux topics like manipulating text, controlling file and directory permissions, and managing user environment variables. You'll then focus on foundational hacking concepts like security and anonymity and learn scripting skills with bash and Python. Practical tutorials and exercises throughout will reinforce and test your skills as you learn how to: Cover your tracks by changing your network information and manipulating the journalctl logging utility Write a tool to scan for network connections, and connect and listen to wireless networks Keep your internet activity stealthy using Tor, proxy servers, VPNs, and encrypted email Write a bash script to find potential attack targets over a range of IP addresses Use and abuse services like MySQL, the Apache web server, and OpenSSH Build your own hacking tools, such as remote spy cameras and password crackers New to this edition: This second edition has been updated to address recent changes to Kali  and Linux, including a more secure approach to  root privileges, updates to Bluetooth and Linux logging functions, and a new chapter with advice on AI in cybersecurity.
Hacking is complex, and there is no single way in. Why not start at the beginning with Linux Basics for Hackers?
A revised introduction to the Linux operating system for beginning hackers and penetration testers. If you're just getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for Hackers is an excellent introduction. With Kali Linux, an operating system designed for digital forensics and penetration testing, you'll learn the basics of using Linux and acquire the tools and techniques you'll need to take control of a Linux environment.
First, you'll learn how to install Kali on a virtual machine and get an introduction to basic Linux concepts. Next, you'll tackle broader Linux topics like manipulating text, controlling file and directory permissions, and managing user environment variables. You'll then focus on foundational hacking concepts like security and anonymity and learn scripting skills with bash and Python. Practical tutorials and exercises throughout will reinforce and test your skills as you learn how to: Cover your tracks by changing your network information and manipulating the journalctl logging utility Write a tool to scan for network connections, and connect and listen to wireless networks Keep your internet activity stealthy using Tor, proxy servers, VPNs, and encrypted email Write a bash script to find potential attack targets over a range of IP addresses Use and abuse services like MySQL, the Apache web server, and OpenSSH Build your own hacking tools, such as remote spy cameras and password crackers New to this edition: This second edition has been updated to address recent changes to Kali  and Linux, including a more secure approach to  root privileges, updates to Bluetooth and Linux logging functions, and a new chapter with advice on AI in cybersecurity.
Hacking is complex, and there is no single way in. Why not start at the beginning with Linux Basics for Hackers?