Table of Contents for
Linux Basics for Hackers
Close
Version ebook
/
Retour
Linux Basics for Hackers
by OccupyTheWeb .
Published by No Starch Press, 2018
Cover Page
Title Page
Copyright Page
Dedication
About the Author
About the Technical Reviewer
BRIEF CONTENTS
CONTENTS IN DETAIL
ACKNOWLEDGMENTS
INTRODUCTION
1 GETTING STARTED WITH THE BASICS
2 TEXT MANIPULATION
3 ANALYZING AND MANAGING NETWORKS
4 ADDING AND REMOVING SOFTWARE
5 CONTROLLING FILE AND DIRECTORY PERMISSIONS
6 PROCESS MANAGEMENT
7 MANAGING USER ENVIRONMENT VARIABLES
8 BASH SCRIPTING
9 COMPRESSING AND ARCHIVING
10 FILESYSTEM AND STORAGE DEVICE MANAGEMENT
11 THE LOGGING SYSTEM
12 USING AND ABUSING SERVICES
13 BECOMING SECURE AND ANONYMOUS
14 UNDERSTANDING AND INSPECTING WIRELESS NETWORKS
15 MANAGING THE LINUX KERNEL AND LOADABLE KERNEL MODULES
16 AUTOMATING TASKS WITH JOB SCHEDULING
17 PYTHON SCRIPTING BASICS FOR HACKERS
INDEX
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali
Contents in Detail
Cover Page
Title Page
Copyright Page
Dedication
About the Author
About the Technical Reviewer
BRIEF CONTENTS
CONTENTS IN DETAIL
ACKNOWLEDGMENTS
INTRODUCTION
What’s in This Book
What Is Ethical Hacking?
Why Hackers Use Linux
Downloading Kali Linux
Virtual Machines
Setting Up Kali
1 GETTING STARTED WITH THE BASICS
Introductory Terms and Concepts
A Tour of Kali
Basic Commands in Linux
Finding Stuff
Modifying Files and Directories
Go Play Now!
Exercises
2 TEXT MANIPULATION
Viewing Files
Filtering Text with grep
Using sed to Find and Replace
Viewing Files with more and less
Summary
Exercises
3 ANALYZING AND MANAGING NETWORKS
Analyzing Networks with ifconfig
Checking Wireless Network Devices with iwconfig
Changing Your Network Information
Manipulating the Domain Name System
Summary
Exercises
4 ADDING AND REMOVING SOFTWARE
Using apt to Handle Software
Adding Repositories to Your sources.list File
Using a GUI-based Installer
Installing Software with git
Summary
Exercises
5 CONTROLLING FILE AND DIRECTORY PERMISSIONS
Different Types of Users
Granting Permissions
Checking Permissions
Changing Permissions
Setting More Secure Default Permissions with Masks
Special Permissions
Summary
Exercises
6 PROCESS MANAGEMENT
Viewing Processes
Managing Processes
Scheduling Processes
Summary
Exercises
7 MANAGING USER ENVIRONMENT VARIABLES
Viewing and Modifying Environment Variables
Changing Your Shell Prompt
Changing Your PATH
Creating a User-Defined Variable
Summary
Exercises
8 BASH SCRIPTING
A Crash Course in Bash
Your First Script: “Hello, Hackers-Arise!”
Your Very First Hacker Script: Scan for Open Ports
Common Built-in Bash Commands
Summary
Exercises
9 COMPRESSING AND ARCHIVING
What Is Compression?
Tarring Files Together
Compressing Files
Creating Bit-by-Bit or Physical Copies of Storage Devices
Summary
Exercises
10 FILESYSTEM AND STORAGE DEVICE MANAGEMENT
The Device Directory /dev
Mounting and Unmounting
Monitoring Filesystems
Summary
Exercises
11 THE LOGGING SYSTEM
The rsyslog Logging Daemon
Automatically Cleaning Up Logs with logrotate
Remaining Stealthy
Summary
Exercises
12 USING AND ABUSING SERVICES
Starting, Stopping, and Restarting Services
Creating an HTTP Web Server with the Apache Web Server
OpenSSH and the Raspberry Spy Pi
Extracting Information from MySQL
Summary
Exercises
13 BECOMING SECURE AND ANONYMOUS
How the Internet Gives Us Away
The Onion Router System
Proxy Servers
Virtual Private Networks
Encrypted Email
Summary
Exercises
14 UNDERSTANDING AND INSPECTING WIRELESS NETWORKS
Wi-Fi Networks
Detecting and Connecting to Bluetooth
Summary
Exercises
15 MANAGING THE LINUX KERNEL AND LOADABLE KERNEL MODULES
What Is a Kernel Module?
Checking the Kernel Version
Kernel Tuning with sysctl
Managing Kernel Modules
Summary
Exercises
16 AUTOMATING TASKS WITH JOB SCHEDULING
Scheduling an Event or Job to Run on an Automatic Basis
Using rc Scripts to Run Jobs at Startup
Adding Services to Your Bootup via a GUI
Summary
Exercises
17 PYTHON SCRIPTING BASICS FOR HACKERS
Adding Python Modules
Getting Started Scripting with Python
Lists
Modules
Object-Oriented Programming (OOP)
Network Communications in Python
Dictionaries, Loops, and Control Statements
Improving Our Hacking Scripts
Exceptions and Password Crackers
Summary
Exercises
INDEX
i
ii
iii
iv
v
vi
vii
viii
ix
x
xi
xii
xiii
xiv
xv
xvi
xvii
xviii
xix
xx
xxi
xxii
xxiii
xxiv
xxv
xxvi
xxvii
xxviii
xxix
xxx
xxxi
xxxii
xxxiii
xxxiv
xxxv
xxxvi
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212