• Chapter 4
  • Chapter 6
  • Chapters 9 and 10
  • Chapter 11
  • L in u X ba sics for h acke rs g e t t I n g s t a r t e d w I t h




    Download 7,3 Mb.
    Pdf ko'rish
    bet15/115
    Sana27.11.2023
    Hajmi7,3 Mb.
    #106243
    1   ...   11   12   13   14   15   16   17   18   ...   115
    Bog'liq
    linuxbasicsforhackers
    mashinali o\'qitishga kirish, 1698393090
    What’s in This Book
    In the first set of chapters you’ll get comfortable with the fundamentals of 
    Linux; Chapter 1 will get you used to the file system and the terminal, and 
    give you some basic commands. Chapter 2 shows you how to manipulate 
    text to find, examine, and alter software and files. 
    In Chapter 3 you’ll manage networks. You’ll scan for networks, find infor-
    mation on connections, and disguise yourself by masking your network and 
    DNS information. 
    Chapter 4 teaches you to add, remove, and update software, and how 
    to keep your system streamlined. In Chapter 5, you’ll manipulate file and 
    directory permissions to control who can access what. You’ll also learn some 
    privilege escalation techniques. 
    Chapter 6 teaches you how to manage services, including starting and 
    stopping processes and allocating resources to give you greater control. In 
    Chapter 7 you’ll manage environment variables for optimal performance, 
    convenience, and even stealth. You’ll find and filter variables, change your 
    PATH variable, and create new environment variables. 
    Chapter 8 introduces you to bash scripting, a staple for any serious 
    hacker. You’ll learn the basics of bash and build a script to scan for target 
    ports that you might later infiltrate.
    Chapters 9 and 10 give you some essential file system management skills, 
    showing you how to compress and archive files to keep your system clean, 
    copy entire storage devices, and get information on files and connected disks. 
    The latter chapters dig deeper into hacking topics. In Chapter 11 you’ll 
    use and manipulate the logging system to get information on a target’s activ-
    ity and cover your own tracks. Chapter 12 shows you how to use and abuse 
    three core Linux services: Apache web server, OpenSSH, and MySQL. You’ll 
    create a web server, build a remote video spy, and learn about databases and 
    their vulnerabilities. Chapter 13 will show you how to stay secure and anony-
    mous with proxy servers, the Tor network, VPNs, and encrypted email. 


    Introduction

    Download 7,3 Mb.
    1   ...   11   12   13   14   15   16   17   18   ...   115




    Download 7,3 Mb.
    Pdf ko'rish

    Bosh sahifa
    Aloqalar

        Bosh sahifa



    L in u X ba sics for h acke rs g e t t I n g s t a r t e d w I t h

    Download 7,3 Mb.
    Pdf ko'rish