Get Free Shipping on orders over $79
Linux Basics for Hackers, 2nd Edition : Getting Started with Networking, Scripting, and Security in Kali - OccupyTheWeb

Linux Basics for Hackers, 2nd Edition

Getting Started with Networking, Scripting, and Security in Kali

By: OccupyTheWeb

eText | 1 July 2025

At a Glance

eText


$39.92

or 4 interest-free payments of $9.98 with

 or 

Instant online reading in your Booktopia eTextbook Library *

Why choose an eTextbook?

Instant Access *

Purchase and read your book immediately

Read Aloud

Listen and follow along as Bookshelf reads to you

Study Tools

Built-in study tools like highlights and more

* eTextbooks are not downloadable to your eReader or an app and can be accessed via web browsers only. You must be connected to the internet and have no technical issues with your device or browser that could prevent the eTextbook from operating.

A revised introduction to the Linux operating system for beginning hackers and penetration testers.

If you're just getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for Hackers is an excellent introduction. With Kali Linux, an operating system designed for digital forensics and penetration testing, you'll learn the basics of using Linux and acquire the tools and techniques you'll need to take control of a Linux environment.

First, you'll learn how to install Kali on a virtual machine and get an introduction to basic Linux concepts. Next, you'll tackle broader Linux topics like manipulating text, controlling file and directory permissions, and managing user environment variables. You'll then focus on foundational hacking concepts like security and anonymity and learn scripting skills with bash and Python.

Practical tutorials and exercises throughout will reinforce and test your skills as you learn how to:

  • Cover your tracks by changing your network information and manipulating the journalctl logging utility
  • Write a tool to scan for network connections, and connect and listen to wireless networks
  • Keep your internet activity stealthy using Tor, proxy servers, VPNs, and encrypted email
  • Write a bash script to find potential attack targets over a range of IP addresses
  • Use and abuse services like MySQL, the Apache web server, and OpenSSH
  • Build your own hacking tools, such as remote spy cameras and password crackers

New to this edition: This second edition has been updated to address recent changes to Kali and Linux, including a more secure approach to root privileges, updates to Bluetooth and Linux logging functions, and a new chapter with advice on AI in cybersecurity.

Hacking is complex, and there is no single way in. Why not start at the beginning with Linux Basics for Hackers?

on
Desktop
Tablet
Mobile

More in Operating Systems

ReFormat : Windows 11 - Adam Natad

eBOOK

Hugging Face in Action - Wei-Meng Lee

eBOOK