• 2) Relational operators
  • 3) Assignment operator
  • Chapter 4: Hacking Procedure
  • Linux: This Book Includes 4 Manuscripts. The Underground Bible to the unix operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line




    Download 6,34 Mb.
    Pdf ko'rish
    bet172/203
    Sana10.01.2024
    Hajmi6,34 Mb.
    #134102
    1   ...   168   169   170   171   172   173   174   175   ...   203
    Bog'liq
    Linux This Book Includes 4 Manuscripts The Underground Bible

    1) Arithmetic operators
    Arithmetic operators deal with mathematical calculations such as addition
    and subtraction. These are important for programming because they can add
    up things and multiply variable count easily. 
    Here is an example command for the arithmetic operators: 
    >>> 2+3
    >>> 2-1
    >>> 6 * 2
    >>> 7/3
    >>> 4 % 7
    2) Relational operators


    Relational operators are significant operators and can be used to change
    things easily. They can be used to compare two things easily. Few of the
    relational operators are AND, OR and NOT. These relational operators can
    be easily implemented in any shell language code. 
    Here is a command-line example that deals with relational operators: 
    >>>> 2 ! = 7
    >>>> x === y
    3) Assignment operator
    The assignment operator just gives the value to a variable or loop code. By
    using this operator one can easily assign things to the element.
    Here is the example for the assignment operator: 
    x = 7
    With this, we have completed a brief exploration of the scripting world.
    Shell language is a must for any hacker that is serious about his job. You
    can also implement these concepts with python programming for doing
    advanced tasks in hacking. In the next chapter, we will start with an
    exploration of going into a hacker's mind and how they plan things. Let us
    start!


    Chapter 4:
    Hacking Procedure


    This chapter is a pathway to help you start thinking like a hacker. To stop
    attacks that would come frequently you should make yourself accustomed
    to the hacking methodology. In this chapter, we will in detail explain the
    phases that one needs to perform to call oneself a hacker. Let us start to the
    exciting world of the hacking process.
    a) Foot-printing the system
    b) Scanning the targets
    c) Getting access to the syste m
    d) Using the access for exploitation
    e) Continuing the access
    f) Creating backdoors in the system
    In the next sections, we will in detail explain the six phases in detail. We
    will give out some example tools which can be used for individual phases.

    Download 6,34 Mb.
    1   ...   168   169   170   171   172   173   174   175   ...   203




    Download 6,34 Mb.
    Pdf ko'rish

    Bosh sahifa
    Aloqalar

        Bosh sahifa



    Linux: This Book Includes 4 Manuscripts. The Underground Bible to the unix operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line

    Download 6,34 Mb.
    Pdf ko'rish