Please note: In order to keep Hive up to date and provide users with the best features, we are no longer able to fully support Internet Explorer. The site is still available to you, however some sections of the site may appear broken. We would encourage you to move to a more modern browser like Firefox, Edge or Chrome in order to experience the site fully.

Hacking With Linux 2020 : A Complete Beginners Guide to the World of Hacking Using Linux - Explore the Methods and Tools of Ethical Hacking with Linux, Paperback / softback Book

Hacking With Linux 2020 : A Complete Beginners Guide to the World of Hacking Using Linux - Explore the Methods and Tools of Ethical Hacking with Linux Paperback / softback

Paperback / softback

Description

You too Can be a White Hat Hacking Genius


If you're getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for Hackers is an excellent first step. Using Kali Linux, an advanced penetration testing distribution of Linux, you'll learn the basics of using the Linux operating system and acquire the tools and techniques you'll need to take control of a Linux environment.


This practical, tutorial-style book uses the Kali Linux distribution to teach Linux basics with a focus on how hackers would use them. Topics include Linux command line basics, filesystems, networking, BASH basics, package management, logging, and the Linux kernel and drivers.


Hacking With Linux takes you from your very first baby steps in installing Kali all the way to learning the basics of working your way into a network and taking control of a Linux environment. Along the way you'll learn the basics of bash scripting, directory setup and all the handy tips and tricks passed down over the years by your fellow ethical hackers!


You can also learn:


  • l - Cover your tracks by changing your network information and manipulating the rsyslog logging utility
  • l - Write a tool to scan for network connections, and connect and listen to wireless networks
  • l - Keep your internet activity stealthy using Tor, proxy servers, VPNs, and encrypted email
  • l - Write a bash script to scan open ports for potential targets
  • l - Use and abuse services like MySQL, Apache web server, and OpenSSH
  • l - Build your own hacking tools, s


Stop trying to recreate the wheel and start from the beginning. This practical guide will help you make sense of the exciting world of ethical hacking and cyber security.


Information

Other Formats

Save 18%

£18.99

£15.49

Item not Available
 
Free Home Delivery

on all orders

 
Pick up orders

from local bookshops

Information