Table of Contents for
Linux Basics for Hackers

Version ebook / Retour

Cover image for bash Cookbook, 2nd Edition Linux Basics for Hackers by OccupyTheWeb . Published by No Starch Press, 2018
  1. Cover Page
  2. Title Page
  3. Copyright Page
  4. Dedication
  5. About the Author
  6. About the Technical Reviewer
  7. BRIEF CONTENTS
  8. CONTENTS IN DETAIL
  9. ACKNOWLEDGMENTS
  10. INTRODUCTION
  11. 1 GETTING STARTED WITH THE BASICS
  12. 2 TEXT MANIPULATION
  13. 3 ANALYZING AND MANAGING NETWORKS
  14. 4 ADDING AND REMOVING SOFTWARE
  15. 5 CONTROLLING FILE AND DIRECTORY PERMISSIONS
  16. 6 PROCESS MANAGEMENT
  17. 7 MANAGING USER ENVIRONMENT VARIABLES
  18. 8 BASH SCRIPTING
  19. 9 COMPRESSING AND ARCHIVING
  20. 10 FILESYSTEM AND STORAGE DEVICE MANAGEMENT
  21. 11 THE LOGGING SYSTEM
  22. 12 USING AND ABUSING SERVICES
  23. 13 BECOMING SECURE AND ANONYMOUS
  24. 14 UNDERSTANDING AND INSPECTING WIRELESS NETWORKS
  25. 15 MANAGING THE LINUX KERNEL AND LOADABLE KERNEL MODULES
  26. 16 AUTOMATING TASKS WITH JOB SCHEDULING
  27. 17 PYTHON SCRIPTING BASICS FOR HACKERS
  28. INDEX
  29. Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali

Contents in Detail

  1. Cover Page
  2. Title Page
  3. Copyright Page
  4. Dedication
  5. About the Author
  6. About the Technical Reviewer
  7. BRIEF CONTENTS
  8. CONTENTS IN DETAIL
  9. ACKNOWLEDGMENTS
  10. INTRODUCTION
    1. What’s in This Book
    2. What Is Ethical Hacking?
    3. Why Hackers Use Linux
    4. Downloading Kali Linux
    5. Virtual Machines
    6. Setting Up Kali
  11. 1 GETTING STARTED WITH THE BASICS
    1. Introductory Terms and Concepts
    2. A Tour of Kali
    3. Basic Commands in Linux
    4. Finding Stuff
    5. Modifying Files and Directories
    6. Go Play Now!
    7. Exercises
  12. 2 TEXT MANIPULATION
    1. Viewing Files
    2. Filtering Text with grep
    3. Using sed to Find and Replace
    4. Viewing Files with more and less
    5. Summary
    6. Exercises
  13. 3 ANALYZING AND MANAGING NETWORKS
    1. Analyzing Networks with ifconfig
    2. Checking Wireless Network Devices with iwconfig
    3. Changing Your Network Information
    4. Manipulating the Domain Name System
    5. Summary
    6. Exercises
  14. 4 ADDING AND REMOVING SOFTWARE
    1. Using apt to Handle Software
    2. Adding Repositories to Your sources.list File
    3. Using a GUI-based Installer
    4. Installing Software with git
    5. Summary
    6. Exercises
  15. 5 CONTROLLING FILE AND DIRECTORY PERMISSIONS
    1. Different Types of Users
    2. Granting Permissions
    3. Checking Permissions
    4. Changing Permissions
    5. Setting More Secure Default Permissions with Masks
    6. Special Permissions
    7. Summary
    8. Exercises
  16. 6 PROCESS MANAGEMENT
    1. Viewing Processes
    2. Managing Processes
    3. Scheduling Processes
    4. Summary
    5. Exercises
  17. 7 MANAGING USER ENVIRONMENT VARIABLES
    1. Viewing and Modifying Environment Variables
    2. Changing Your Shell Prompt
    3. Changing Your PATH
    4. Creating a User-Defined Variable
    5. Summary
    6. Exercises
  18. 8 BASH SCRIPTING
    1. A Crash Course in Bash
    2. Your First Script: “Hello, Hackers-Arise!”
    3. Your Very First Hacker Script: Scan for Open Ports
    4. Common Built-in Bash Commands
    5. Summary
    6. Exercises
  19. 9 COMPRESSING AND ARCHIVING
    1. What Is Compression?
    2. Tarring Files Together
    3. Compressing Files
    4. Creating Bit-by-Bit or Physical Copies of Storage Devices
    5. Summary
    6. Exercises
  20. 10 FILESYSTEM AND STORAGE DEVICE MANAGEMENT
    1. The Device Directory /dev
    2. Mounting and Unmounting
    3. Monitoring Filesystems
    4. Summary
    5. Exercises
  21. 11 THE LOGGING SYSTEM
    1. The rsyslog Logging Daemon
    2. Automatically Cleaning Up Logs with logrotate
    3. Remaining Stealthy
    4. Summary
    5. Exercises
  22. 12 USING AND ABUSING SERVICES
    1. Starting, Stopping, and Restarting Services
    2. Creating an HTTP Web Server with the Apache Web Server
    3. OpenSSH and the Raspberry Spy Pi
    4. Extracting Information from MySQL
    5. Summary
    6. Exercises
  23. 13 BECOMING SECURE AND ANONYMOUS
    1. How the Internet Gives Us Away
    2. The Onion Router System
    3. Proxy Servers
    4. Virtual Private Networks
    5. Encrypted Email
    6. Summary
    7. Exercises
  24. 14 UNDERSTANDING AND INSPECTING WIRELESS NETWORKS
    1. Wi-Fi Networks
    2. Detecting and Connecting to Bluetooth
    3. Summary
    4. Exercises
  25. 15 MANAGING THE LINUX KERNEL AND LOADABLE KERNEL MODULES
    1. What Is a Kernel Module?
    2. Checking the Kernel Version
    3. Kernel Tuning with sysctl
    4. Managing Kernel Modules
    5. Summary
    6. Exercises
  26. 16 AUTOMATING TASKS WITH JOB SCHEDULING
    1. Scheduling an Event or Job to Run on an Automatic Basis
    2. Using rc Scripts to Run Jobs at Startup
    3. Adding Services to Your Bootup via a GUI
    4. Summary
    5. Exercises
  27. 17 PYTHON SCRIPTING BASICS FOR HACKERS
    1. Adding Python Modules
    2. Getting Started Scripting with Python
    3. Lists
    4. Modules
    5. Object-Oriented Programming (OOP)
    6. Network Communications in Python
    7. Dictionaries, Loops, and Control Statements
    8. Improving Our Hacking Scripts
    9. Exceptions and Password Crackers
    10. Summary
    11. Exercises
  28. INDEX
  1. i
  2. ii
  3. iii
  4. iv
  5. v
  6. vi
  7. vii
  8. viii
  9. ix
  10. x
  11. xi
  12. xii
  13. xiii
  14. xiv
  15. xv
  16. xvi
  17. xvii
  18. xviii
  19. xix
  20. xx
  21. xxi
  22. xxii
  23. xxiii
  24. xxiv
  25. xxv
  26. xxvi
  27. xxvii
  28. xxviii
  29. xxix
  30. xxx
  31. xxxi
  32. xxxii
  33. xxxiii
  34. xxxiv
  35. xxxv
  36. xxxvi
  37. 1
  38. 2
  39. 3
  40. 4
  41. 5
  42. 6
  43. 7
  44. 8
  45. 9
  46. 10
  47. 11
  48. 12
  49. 13
  50. 14
  51. 15
  52. 16
  53. 17
  54. 18
  55. 19
  56. 20
  57. 21
  58. 22
  59. 23
  60. 24
  61. 25
  62. 26
  63. 27
  64. 28
  65. 29
  66. 30
  67. 31
  68. 32
  69. 33
  70. 34
  71. 35
  72. 36
  73. 37
  74. 38
  75. 39
  76. 40
  77. 41
  78. 42
  79. 43
  80. 44
  81. 45
  82. 46
  83. 47
  84. 48
  85. 49
  86. 50
  87. 51
  88. 52
  89. 53
  90. 54
  91. 55
  92. 56
  93. 57
  94. 58
  95. 59
  96. 60
  97. 61
  98. 62
  99. 63
  100. 64
  101. 65
  102. 66
  103. 67
  104. 68
  105. 69
  106. 70
  107. 71
  108. 72
  109. 73
  110. 74
  111. 75
  112. 76
  113. 77
  114. 78
  115. 79
  116. 80
  117. 81
  118. 82
  119. 83
  120. 84
  121. 85
  122. 86
  123. 87
  124. 88
  125. 89
  126. 90
  127. 91
  128. 92
  129. 93
  130. 94
  131. 95
  132. 96
  133. 97
  134. 98
  135. 99
  136. 100
  137. 101
  138. 102
  139. 103
  140. 104
  141. 105
  142. 106
  143. 107
  144. 108
  145. 109
  146. 110
  147. 111
  148. 112
  149. 113
  150. 114
  151. 115
  152. 116
  153. 117
  154. 118
  155. 119
  156. 120
  157. 121
  158. 122
  159. 123
  160. 124
  161. 125
  162. 126
  163. 127
  164. 128
  165. 129
  166. 130
  167. 131
  168. 132
  169. 133
  170. 134
  171. 135
  172. 136
  173. 137
  174. 138
  175. 139
  176. 140
  177. 141
  178. 142
  179. 143
  180. 144
  181. 145
  182. 146
  183. 147
  184. 148
  185. 149
  186. 150
  187. 151
  188. 152
  189. 153
  190. 154
  191. 155
  192. 156
  193. 157
  194. 158
  195. 159
  196. 160
  197. 161
  198. 162
  199. 163
  200. 164
  201. 165
  202. 166
  203. 167
  204. 168
  205. 169
  206. 170
  207. 171
  208. 172
  209. 173
  210. 174
  211. 175
  212. 176
  213. 177
  214. 178
  215. 179
  216. 180
  217. 181
  218. 182
  219. 183
  220. 184
  221. 185
  222. 186
  223. 187
  224. 188
  225. 189
  226. 190
  227. 191
  228. 192
  229. 193
  230. 194
  231. 195
  232. 196
  233. 197
  234. 198
  235. 199
  236. 200
  237. 201
  238. 202
  239. 203
  240. 204
  241. 205
  242. 206
  243. 207
  244. 208
  245. 209
  246. 210
  247. 211
  248. 212
Back to top