|
L in u X ba sics for h acke rs g e t t I n g s t a r t e d w I t hBog'liq linuxbasicsforhackersAbout the Author
OccupyTheWeb (OTW) is the pseudonym for the founder and primary
writer for the hacker and pentester training website, https://www.hackers-
arise.com/. He is a former college professor and has over 20 years of expe-
rience in the information technology industry. He has trained hackers
throughout the US, including branches of the US military (Army, Air Force,
and Navy) and the US intelligence community (CIA, NSA, and DNI). He is
also an avid mountain biker and snow boarder.
About the Technical Reviewer
Since the early days of Commodore PET and VIC-20, technology has been
a constant companion (and sometimes an obsession!) to Cliff Janzen. Cliff
discovered his career passion when he moved to information security in
2008 after a decade of IT operations. Since then, Cliff has had the great
fortune to work with and learn from some of the best people in the industry
including OccupyTheWeb and the fine people at No Starch during the
production of this book. He is happily employed as a security consultant,
doing everything from policy review to penetration tests. He feels lucky to
have a career that is also his favorite hobby and a wife that supports him.
B R I E F C O N T E N T S
Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xix
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxi
Chapter 1: Getting Started with the Basics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Chapter 2: Text Manipulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Chapter 3: Analyzing and Managing Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Chapter 4: Adding and Removing Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Chapter 5: Controlling File and Directory Permissions . . . . . . . . . . . . . . . . . . . . . . . . . 49
Chapter 6: Process Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Chapter 7: Managing User Environment Variables . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Chapter 8: Bash Scripting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
Chapter 9: Compressing and Archiving . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Chapter 10: Filesystem and Storage Device Management . . . . . . . . . . . . . . . . . . . . . 101
Chapter 11: The Logging System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
Chapter 12: Using and Abusing Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
Chapter 13: Becoming Secure and Anonymous . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
Chapter 14: Understanding and Inspecting Wireless Networks . . . . . . . . . . . . . . . . . 153
Chapter 15: Managing the Linux Kernel and Loadable Kernel Modules . . . . . . . . . . . 165
Chapter 16: Automating Tasks with Job Scheduling . . . . . . . . . . . . . . . . . . . . . . . . . 173
Chapter 17: Python Scripting Basics for Hackers . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
|
| |