+49 (0) 541 / 40666 200

Sie erreichen uns Montag bis
Freitag von 8 bis 16 Uhr

 

Schreiben Sie uns eine Email oder benutzten eine andere Kontaktmöglichkeit
 Versandkostenfrei in Deutschland
Einkaufskorb
Keine Artikel
in Ihrem
Einkaufskorb

Linux Basics for Hackers

Getting Started with Networking, Scripting, and Security in Kali - 500 - 841089

Taschenbuch von Occupytheweb

87161915
Zum Vergrößern anklicken

nur 27,89 €

Sie sparen 5,61 € (17 %) gegenüber dem alten Preis von 33,50 €
(portofrei!, inkl. MwSt.)

Widerruf zu diesem Artikel
  • Details
  • Beschreibung
  • Information zum Autor
  • Bilder
Details
Artikel-Nr.:
87161915
Im Sortiment seit:
26.04.2018
Erscheinungsdatum:
01/2019
Medium:
Taschenbuch
Einband:
Kartoniert / Broschiert
Autor:
Occupytheweb
Verlag:
Random House LCC US
Imprint:
No Starch Press
Sprache:
Englisch
Rubrik:
Informatik
EDV
Seiten:
211
Gewicht:
497 gr
Beschreibung
This practical, tutorial-style book uses the Kali Linux distribution to teach Linux basics with a focus on how hackers would use them. Topics include Linux command line basics, filesystems, networking, BASH basics, package management, logging, and the Linux kernel and drivers.

If you're getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for Hackers is an excellent first step. Using Kali Linux, an advanced penetration testing distribution of Linux, you'll learn the basics of using the Linux operating system and acquire the tools and techniques you'll need to take control of a Linux environment.

First, you'll learn how to install Kali on a virtual machine and get an introduction to basic Linux concepts. Next, you'll tackle broader Linux topics like manipulating text, controlling file and directory permissions, and managing user environment variables. You'll then focus in on foundational hacking concepts like security and anonymity and learn scripting skills with bash and Python. Practical tutorials and exercises throughout will reinforce and test your skills as you learn how to:

- Cover your tracks by changing your network information and manipulating the rsyslog logging utility
- Write a tool to scan for network connections, and connect and listen to wireless networks
- Keep your internet activity stealthy using Tor, proxy servers, VPNs, and encrypted email
- Write a bash script to scan open ports for potential targets
- Use and abuse services like MySQL, Apache web server, and OpenSSH
- Build your own hacking tools, such as a remote video spy camera and a password cracker

Hacking is complex, and there is no single way in. Why not start at the beginning with Linux Basics for Hackers ?
Information zum Autor
OccupyTheWeb is an infosec consultant, forensic investigator, and trainer with more than 20 years in the industry. He maintains the Hackers-Arise training site ( h**ps://w*w*hackers-arise.com/ ) and trains US military personnel, Department of Defense contractors, and federal employees in information security and hacking.
Bilder