Linux Essentials for Hackers and Pentesters. Kali Linux Basics...2023.pdf

(8596 KB) Pobierz
GitforGitS
Linux
Essentials
for
Hackers
&
Pentesters
Kali
Linux
Basics
for
Wireless
Hacking,
Penetration
Testing,
VPNs,
Proxy
Servers
and
Networking
Commands
Linux
Advocate
Team
Linux
Essentials
for
Hackers
&
Pentesters
Kali
Linux
Basics
for
Wireless
Hacking,
Penetration
Testing,
VPNs,
Proxy
Servers
and
Networking
Commands
Linux
Advocate
Team
Copyright
©
2023GitforGits
All
rights
reserved.
ISBN:
978-8196228514
Contents
Preface
................................................................................................................................................................
xiii
Chapter
1:
Up
and
Running
with
Linux
Basics...........................................................................................
1
Understanding
Terminal
...................................................................................................................................................
2
Introduction
.......................................................................................................................................................................
2
Characteristics
of
Terminal
.........................................................................................................................................
2
Steps
using
Terminal
in Kali
Linux
...........................................................................................................................3
Exploring
Filesystem...........................................................................................................................................................
4
Filesystem
Hierarchy
Standard
(FHS)
....................................................................................................................4
Characteristics
of
Filesystem
......................................................................................................................................
4
Components
of
Filesystem
...........................................................................................................................................
5
Popular
Commands
In-Use
...............................................................................................................................................
6
What
are
Commands?
....................................................................................................................................................
6
The
Implementation
of
Commands..........................................................................................................................6
25
Everyday
Commands
for
Use
...............................................................................................................................8
Learning
Binaries
.................................................................................................................................................................
9
What
are
Binaries
in
Kali?
............................................................................................................................................
9
Benefits
of
Binaries
......................................................................................................................................................
10
How
to
Use
Binaries?
..................................................................................................................................................
10
Functionality
of
Top
50
Binaries
............................................................................................................................
11
Finding
Binaries
.................................................................................................................................................................
14
Searching
Binaries
........................................................................................................................................................
14
Creating
Files
and
Directories
......................................................................................................................................
15
Essentials
of
Files
and
Directories
in
Kali
Linux
.............................................................................................
15
i
Create
File
........................................................................................................................................................................
16
Create
Directory ............................................................................................................................................................
16
Modifying
Files
and
Directories...................................................................................................................................
17
Deleting
Files
.......................................................................................................................................................................
18
Summary
...............................................................................................................................................................................
19
Hack#1:
Operating
Multiple
Files
...............................................................................................................................
19
Hack#2:
To
Find
and
Operate
On
Files.....................................................................................................................20
Hack#3:
Search
For
Text
Patterns
..............................................................................................................................
20
Hack#4:
Extract
and
Manipulate Text
Files...........................................................................................................
20
Hack#5:
Work
On
Multiple
Files
.................................................................................................................................
21
C
hapter
2:
H
ow
T
O
M
anipulate
T
ext
?
22
Overview
of
Text-Related
Commands
.....................................................................................................................
23
Viewing,
Filtering,
Extracting........................................................................................................................................
23
Using
‘grep’ ...........................................................................................................................................................................
25
Using
‘nl’ ................................................................................................................................................................................
26
Using
‘tail’
.............................................................................................................................................................................
28
Using
‘head’
..........................................................................................................................................................................
29
Using
‘sed’ .............................................................................................................................................................................
31
Using
‘more’
and
‘less’
.....................................................................................................................................................
34
Summary
...............................................................................................................................................................................
35
Hack#1:
Searching
Complex
Pattern
.........................................................................................................................
36
Hack#2:
Editing
Files
.......................................................................................................................................................
36
Hack#3:
Specify
Starting
Line
Number
...................................................................................................................
37
Hack#4:
Monitoring
Files...............................................................................................................................................
38
Hack#5:
Combining
Text
Commands
........................................................................................................................
38
C
hapter
3:
A
dministering
N
etworks
........................................................................................................
39
Overview
of
Network-Related
Commands
............................................................................................................
40
ii
Zgłoś jeśli naruszono regulamin