Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover Page
Title Page
Copyright Page
Dedication
About the Author
About the Technical Reviewer
BRIEF CONTENTS
CONTENTS IN DETAIL
ACKNOWLEDGMENTS
INTRODUCTION
What’s in This Book
What Is Ethical Hacking?
Why Hackers Use Linux
Downloading Kali Linux
Virtual Machines
Setting Up Kali
1 GETTING STARTED WITH THE BASICS
Introductory Terms and Concepts
A Tour of Kali
Basic Commands in Linux
Finding Stuff
Modifying Files and Directories
Go Play Now!
Exercises
2 TEXT MANIPULATION
Viewing Files
Filtering Text with grep
Using sed to Find and Replace
Viewing Files with more and less
Summary
Exercises
3 ANALYZING AND MANAGING NETWORKS
Analyzing Networks with ifconfig
Checking Wireless Network Devices with iwconfig
Changing Your Network Information
Manipulating the Domain Name System
Summary
Exercises
4 ADDING AND REMOVING SOFTWARE
Using apt to Handle Software
Adding Repositories to Your sources.list File
Using a GUI-based Installer
Installing Software with git
Summary
Exercises
5 CONTROLLING FILE AND DIRECTORY PERMISSIONS
Different Types of Users
Granting Permissions
Checking Permissions
Changing Permissions
Setting More Secure Default Permissions with Masks
Special Permissions
Summary
Exercises
6 PROCESS MANAGEMENT
Viewing Processes
Managing Processes
Scheduling Processes
Summary
Exercises
7 MANAGING USER ENVIRONMENT VARIABLES
Viewing and Modifying Environment Variables
Changing Your Shell Prompt
Changing Your PATH
Creating a User-Defined Variable
Summary
Exercises
8 BASH SCRIPTING
A Crash Course in Bash
Your First Script: “Hello, Hackers-Arise!”
Your Very First Hacker Script: Scan for Open Ports
Common Built-in Bash Commands
Summary
Exercises
9 COMPRESSING AND ARCHIVING
What Is Compression?
Tarring Files Together
Compressing Files
Creating Bit-by-Bit or Physical Copies of Storage Devices
Summary
Exercises
10 FILESYSTEM AND STORAGE DEVICE MANAGEMENT
The Device Directory /dev
Mounting and Unmounting
Monitoring Filesystems
Summary
Exercises
11 THE LOGGING SYSTEM
The rsyslog Logging Daemon
Automatically Cleaning Up Logs with logrotate
Remaining Stealthy
Summary
Exercises
12 USING AND ABUSING SERVICES
Starting, Stopping, and Restarting Services
Creating an HTTP Web Server with the Apache Web Server
OpenSSH and the Raspberry Spy Pi
Extracting Information from MySQL
Summary
Exercises
13 BECOMING SECURE AND ANONYMOUS
How the Internet Gives Us Away
The Onion Router System
Proxy Servers
Virtual Private Networks
Encrypted Email
Summary
Exercises
14 UNDERSTANDING AND INSPECTING WIRELESS NETWORKS
Wi-Fi Networks
Detecting and Connecting to Bluetooth
Summary
Exercises
15 MANAGING THE LINUX KERNEL AND LOADABLE KERNEL MODULES
What Is a Kernel Module?
Checking the Kernel Version
Kernel Tuning with sysctl
Managing Kernel Modules
Summary
Exercises
16 AUTOMATING TASKS WITH JOB SCHEDULING
Scheduling an Event or Job to Run on an Automatic Basis
Using rc Scripts to Run Jobs at Startup
Adding Services to Your Bootup via a GUI
Summary
Exercises
17 PYTHON SCRIPTING BASICS FOR HACKERS
Adding Python Modules
Getting Started Scripting with Python
Lists
Modules
Object-Oriented Programming (OOP)
Network Communications in Python
Dictionaries, Loops, and Control Statements
Improving Our Hacking Scripts
Exceptions and Password Crackers
Summary
Exercises
INDEX
← Prev
Back
Next →
← Prev
Back
Next →