102
Chapter 10
Hackers commonly use external media to load data, hacking tools, or even
their OS. Once you’re on your target system, you need to understand what
you’re working with, where to find confidential or other critical files, how to
mount a drive to the target, and whether and where you can put those files
on your system. We cover all of these topics, plus how to manage and moni-
tor storage devices, in this chapter.
We begin with the directory known as
/dev, which you’ve probably
already noticed in the directory structure:
dev is short for
device, and every
device in Linux is represented by its own file within the
/dev directory. Let’s
start out by working with
/dev.