|
L in u X ba sics for h acke rs g e t t I n g s t a r t e d w I t hBog'liq linuxbasicsforhackersWhat’s in This Book
In
the first set of chapters you’ll
get comfortable with the fundamentals of
Linux;
Chapter 1
will get you used to the file system and the terminal, and
give you some basic commands.
Chapter 2
shows you how to manipulate
text to find, examine, and alter software and files.
In
Chapter 3
you’ll manage networks. You’ll scan for networks, find infor-
mation on connections, and disguise yourself by masking your network and
DNS information.
Chapter 4
teaches you to add, remove, and update software, and how
to keep your system streamlined. In
Chapter 5
,
you’ll manipulate file and
directory permissions to control who can access what. You’ll also learn some
privilege escalation techniques.
Chapter 6
teaches you how to manage services, including starting and
stopping processes and allocating resources to give you greater control. In
Chapter 7
you’ll manage environment variables for optimal performance,
convenience, and even stealth. You’ll find and filter variables, change your
PATH variable, and create new environment variables.
Chapter 8
introduces you to bash scripting, a staple for any serious
hacker. You’ll learn the basics of bash and build a script to scan for target
ports that you might later infiltrate.
Chapters 9
and 10
give you some essential file system management skills,
showing you how to compress and archive files to keep your system clean,
copy entire storage devices, and get information on files and connected disks.
The latter chapters dig deeper into hacking topics. In
Chapter 11
you’ll
use and manipulate the logging system to get information on a target’s activ-
ity and cover your own tracks.
Chapter 12
shows you how to use and abuse
three core Linux services: Apache web server, OpenSSH, and MySQL. You’ll
create a web server, build a remote video spy, and learn about databases and
their vulnerabilities.
Chapter 13
will show you how to stay secure and anony-
mous with proxy servers, the Tor network, VPNs, and encrypted email.
|
| |