WHAT’S IN THIS BOOK
In the first set of chapters you’ll get comfortable with the fundamentals of Linux;
Chapter 2 shows you how to manipulate text to find, examine, and
alter software and files.
In Chapter 3 you’ll manage networks. You’ll scan for networks, find information on
connections, and disguise yourself by masking your network and DNS information.
Chapter 4 teaches you to add, remove, and update software, and how to keep your
In Chapter 5, you’ll manipulate file and directory permissions to
control who can access what. You’ll also learn some privilege escalation techniques.
Chapter 6 teaches you how to manage services, including starting and stopping
processes and allocating resources to give you greater control.
In Chapter 7 you’ll manage environment variables for optimal performance, convenience, and even stealth.
You’ll find and filter variables, change your PATH variable, and create new
Chapter 8 introduces you to bash scripting, a staple for any serious hacker. You’ll
learn the basics of bash and build a script to scan for target ports that you might later
Chapters 9 and 10 give you some essential file system management skills, showing
you how to compress and archive files to keep your system clean, copy entire storage
devices, and get information on files and connected disks.