Saturday, January 12, 2019

First step to becoming a hacker: Linux!

If you're contemplating a career in cybersecurity and haven't come up to speed on Linux, now's the time to get ramped up and here's one easy way to do it. This new book from no starch press was written with people like you in mind. Authored by OccupyTheWeb, the force behind Hackers-Arise, Linux Basics for Hackers provides everything from basic Linux command line skills through to scripting, manipulating logging, network scanning, using and abusing system services, and remaining stealthy in the process.

Why Linux?

Because Linux is open source, tool developers (and you) have a level of access that is unsurpassed. Linux is transparent and this means that you can learn to manipulate it in ways that are not possible with most OSes. In addition (and undoubtedly for the reason just mentioned), most cybersecurity tools are written to run on Linux.

What is Kali Linux?

Kali Linux is a special Linux distribution that is built for penetration testing and ethical hacking. It's a derivation of Debian and was designed specifically for digital forensics and penetration testing. It's available for downloading at

The number and variety of tools for information gathering, vulnerability analysis, exploitation, forensics, and more in Kali is quite mind-boggling. Check out this tools listing page and don't fail to scroll down to view all the types of tools available.

Who is OccupyTheWeb?

With an extremely impressive background and a determination to helping motivated individuals acquire the skills they will need to work in what is an extremely important as well as an exciting field, OccupyTheWeb is an information security consultant as well as a forensic investigator. He has worked with numerous federal and military organizations and is very highly skilled.

The book

You should consider starting this book by installing Kali Linux and using it while you work through the exercises at the ends of the chapters. Kali comes with all the tools you will need. The book will walk you through the installation process as well as what is required to install VirtualBox and then install Kali as a virtual system.

What the book covers

As you can see from the high-level table of contents shown below, this book starts with basic command line commands (pwd, whoami, more and less, head and tail, locate, whereis, etc.). It then covers creating files and directories, managing network settings, installing packages, managing permissions and processes, and setting up the user environment. It also introduces scripting, using compression tools, managing file systems and devices, and both using and circumventing logging. It provides details on setting up and using Apache, OpenSSH, the Raspberry Spi Pi, and MySQL. The book also helps the reader understand what is required to work anonymously.

You will also learn how to work with kernel modules, schedule tasks and start-up processes, and write scripts using Python.

The exercises at the end of each chapter are crafted to provide critical insights and to help you to develop the skills you'll need to become a top notch security professional.

Chapter 1: Getting Started with the Basics
Chapter 2: Text Manipulation
Chapter 3: Analyzing and Managing Networks
Chapter 4: Adding and Removing Software
Chapter 5: Controlling File and Directory Permissions
Chapter 6: Process Management
Chapter 7: Managing User Environment Variables
Chapter 8: Bash Scripting
Chapter 9: Compressing and Archiving
Chapter 10: Filesystem and Storage Device Management
Chapter 11: The Logging System
Chapter 12: Using and Abusing Services
Chapter 13: Security and Anonymity
Chapter 14: Wireless Networking
Chapter 15: Linux Kernel and Drivers
Chapter 16: Startup Scripts
Chapter 17: Python Scripting Basics

Wrap Up

If you're already a seasoned hacker or a Linux sysadmin with a lot of experience, a lot of the material in this text will likely be wasted on you. If you're just getting started or working your way to expert level, getting a copy of this book might be one of the best things you can do to develop your skills.

Join the Network World communities on Facebook and LinkedIn to comment on topics that are top of mind.

Let's block ads! (Why?)

Thanks to Sandra Henry-Stocker (see source)

No comments:

Post a Comment