•  Retrait gratuit dans votre magasin Club
  •  7.000.000 titres dans notre catalogue
  •  Payer en toute sécurité
  •  Toujours un magasin près de chez vous     
  •  Retrait gratuit dans votre magasin Club
  •  7.000.000 titres dans notre catalogue
  •  Payer en toute sécurité
  •  Toujours un magasin près de chez vous
  1. Accueil
  2. Livres
  3. Savoirs
  4. Informatique
  5. Sciences informatiques
  6. Intelligence artificielle
  7. Hacking With Linux 2020:A Complete Beginners Guide to the World of Hacking Using Linux - Explore the Methods and Tools of Ethical Hacking with Linux

Hacking With Linux 2020:A Complete Beginners Guide to the World of Hacking Using Linux - Explore the Methods and Tools of Ethical Hacking with Linux EBOOK

Joseph Kenna
Ebook | Anglais
2,99 €
+ 2 points
Disponible immédiatement
Passer une commande en un clic
Payer en toute sécurité

Description

You too Can be a White Hat Hacking Genius

 

If you're getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for Hackers is an excellent first step. Using Kali Linux, an advanced penetration testing distribution of Linux, you'll learn the basics of using the Linux operating system and acquire the tools and techniques you'll need to take control of a Linux environment.

 

This practical, tutorial-style book uses the Kali Linux distribution to teach Linux basics with a focus on how hackers would use them. Topics include Linux command line basics, filesystems, networking, BASH basics, package management, logging, and the Linux kernel and drivers.

 

Hacking With Linux takes you from your very first baby steps in installing Kali all the way to learning the basics of working your way into a network and taking control of a Linux environment. Along the way you'll learn the basics of bash scripting, directory setup and all the handy tips and tricks passed down over the years by your fellow ethical hackers!

 

You can also learn:

 

- Cover your tracks by changing your network information and manipulating the rsyslog logging utility - Write a tool to scan for network connections, and connect and listen to wireless networks - Keep your internet activity stealthy using Tor, proxy servers, VPNs, and encrypted email - Write a bash script to scan open ports for potential targets - Use and abuse services like MySQL, Apache web server, and OpenSSH - Build your own hacking tools, s

 

Stop trying to recreate the wheel and start from the beginning. This practical guide will help you make sense of the exciting world of ethical hacking and cyber security.

 

Spécifications

Parties prenantes

Auteur(s) :
Editeur:

Contenu

Langue:
Anglais

Caractéristiques

EAN:
9781393566786
Date de parution :
18-06-20
Format:
Ebook
Protection digitale:
/
Format numérique:
ePub

Les avis