If you’re contemplating a career in cybersecurity and haven’t come up to speed on Linux, now’s the time to get ramped up and here’s one easy way to do it. This new book from no starch press was written with people like you in mind. Authored by OccupyTheWeb, the force behind Hackers-Arise, Linux Basics for Hackers provides everything from basic Linux command line skills through to scripting, manipulating logging, network scanning, using and abusing system services, and remaining stealthy in the process.
Because Linux is open source, tool developers (and you) have a level of access that is unsurpassed. Linux is transparent and this means that you can learn to manipulate it in ways that are not possible with most OSes. In addition (and undoubtedly for the reason just mentioned), most cybersecurity tools are written to run on Linux.
What is Kali Linux?
Kali Linux is a special Linux distribution that is built for penetration testing and ethical hacking. It’s a derivation of Debian and was designed specifically for digital forensics and penetration testing. It’s available for downloading at kali.org.
The number and variety of tools for information gathering, vulnerability analysis, exploitation, forensics, and more in Kali is quite mind-boggling. Check out this tools listing page and don’t fail to scroll down to view all the types of tools available.
Who is OccupyTheWeb?
With an extremely impressive background and a determination to helping motivated individuals acquire the skills they will need to work in what is an extremely important as well as an exciting field, OccupyTheWeb is an information security consultant as well as a forensic investigator. He has worked with numerous federal and military organizations and is very highly skilled.
You should consider starting this book by installing Kali Linux and using it while you work through the exercises at the ends of the chapters. Kali comes with all the tools you will need. The book will walk you through the installation process as well as what is required to install VirtualBox and then install Kali as a virtual system.
What the book covers
As you can see from the high-level table of contents shown below, this book starts with basic command line commands (pwd, whoami, more and less, head and tail, locate, whereis, etc.). It then covers creating files and directories, managing network settings, installing packages, managing permissions and processes, and setting up the user environment. It also introduces scripting, using compression tools, managing file systems and devices, and both using and circumventing logging. It provides details on setting up and using Apache, OpenSSH, the Raspberry Spi Pi, and MySQL. The book also helps the reader understand what is required to work anonymously.
You will also learn how to work with kernel modules, schedule tasks and start-up processes, and write scripts using Python.
The exercises at the end of each chapter are crafted to provide critical insights and to help you to develop the skills you’ll need to become a top notch security professional.
Introduction Chapter 1: Getting Started with the Basics Chapter 2: Text Manipulation Chapter 3: Analyzing and Managing Networks Chapter 4: Adding and Removing Software Chapter 5: Controlling File and Directory Permissions Chapter 6: Process Management Chapter 7: Managing User Environment Variables Chapter 8: Bash Scripting Chapter 9: Compressing and Archiving Chapter 10: Filesystem and Storage Device Management Chapter 11: The Logging System Chapter 12: Using and Abusing Services Chapter 13: Security and Anonymity Chapter 14: Wireless Networking Chapter 15: Linux Kernel and Drivers Chapter 16: Startup Scripts Chapter 17: Python Scripting Basics
If you’re already a seasoned hacker or a Linux sysadmin with a lot of experience, a lot of the material in this text will likely be wasted on you. If you’re just getting started or working your way to expert level, getting a copy of this book might be one of the best things you can do to develop your skills.