Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali
English | February 6th, 2019 | ISBN: 1593278551 | 248 Pages | AZW3 (True/HQ) | 18.5 MB
Operating Systems, Linux
This practical, tutorial-style book uses the Kali Linux distribution to teach Linux basics with a focus on how hackers would use them. Topics include Linux command line basics, filesystems, networking, BASH basics, package management, logging, and the Linux kernel and drivers.
If you're getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for Hackers is an excellent first step. Using Kali Linux, an advanced penetration testing distribution of Linux, you'll learn the basics of using the Linux operating system and acquire the tools and techniques you'll need to take control of a Linux environment.
First, you'll learn how to install Kali on a virtual machine and get an introduction to basic Linux concepts. Next, you'll tackle broader Linux topics like manipulating text, controlling file and directory permissions, and managing user environment variables. You'll then focus in on foundational hacking concepts like security and anonymity and learn scripting skills with bash and Python.
Practical tutorials and exercises throughout will reinforce and test your skills as you learn how to:
Cover your tracks by changing your network information and manipulating the rsyslog logging utility
Write a tool to scan for network connections, and connect and listen to wireless networks
Keep your internet activity stealthy using Tor, proxy servers, VPNs, and encrypted email
Write a bash script to scan open ports for potential targets
Use and abuse services like MySQL, Apache web server, and OpenSSH
Build your own hacking tools, such as a remote video spy camera and a password cracker
Download:
http://longfiles.com/vl8493amgoqd/Linux_Basics_for_Hackers_Getting_Started_with_Networking,_Scripting,_and_Security_in_Kali.azw3.html
Computer Networks Security from Scratch
CEH Certified Ethical Hacker Bundle
Mathematical Cryptology
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World
IPv6 Essentials
Fire Safety of Historical Buildings
The Wireshark Field Guide
Listening In: Cybersecurity in an Insecure Age
CISSP For Dummies (For Dummies (Computer/tech)), 6th Edition
Network Security Technologies, Second Edition
Anti-Spam Measures: Analysis and Design
The Privatization of Israeli Security
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Trusted Computing and Information Security(2572)
The Manga Guide to Cryptography(2068)
How to hack Websites(1877)
Mastering Python Design Patterns: A guide (1820)
Cybersecurity Essentials(1813)
Artificial Intelligence Safety and Securit(1746)
Computer Security: Art and Science, 2nd Ed(1729)
Practical Network Scanning: Capture networ(1711)
Cybersecurity - Attack and Defense Strateg(1682)
Gray Hat Hacking: The Ethical Hacker's Han(1669)
Computer Security: Principles and Practice(1667)
The Wireshark Field Guide(1579)
Google Cloud Platform Administration: Desi(1534)
History of Cryptography and Cryptanalysis:(1530)
