{"product_id":"linux-essentials-for-hackers-pentesters-kali-linux-basics-for-wireless-hacking-penetration-testing-vpns-proxy-servers-and-networking-commands-paperback","title":"Linux Essentials for Hackers \u0026 Pentesters: Kali Linux Basics for Wireless Hacking, Penetration Testing, VPNs, Proxy Servers and Networking Commands - Paperback","description":"\u003cp\u003eby \u003cb\u003eLinux Advocate Team\u003c\/b\u003e (Author)\u003c\/p\u003e\u003cp\u003eKali Linux Basics for Wireless Hacking, Penetration Testing, VPNs, Proxy Servers and Networking Command\u003cbr\u003e\"Linux Essentials for Hackers \u0026amp; Pentesters\" is a hands-on tutorial-style book that teaches you the fundamentals of Linux, emphasising ethical hacking and penetration testing. This book employs the Kali Linux distribution to teach readers how to use Linux commands and packages to perform security testing on systems and networks. \u003c\/p\u003e\u003cp\u003e\u003c\/p\u003e\u003cb\u003eText manipulation, network administration, ownership and permissions, BASH scripting, proxy servers, VPNs, and wireless networks are covered. The book prepares you to perform web application hacking and build your own hacking Linux toolkit by teaching you how to use Linux commands and begin to think like a hacker. Hands-on exercises and practical examples are included in each chapter to reinforce the concepts covered.\u003c\/b\u003e \u003cp\u003e\u003c\/p\u003eThis book is a must-have for anyone interested in a career in ethical hacking and penetration testing. Emphasizing ethical hacking practices, you'll learn not only how to hack but also how to do so responsibly and legally. This book will provide you with the skills and knowledge you need to make a positive impact in the field of cybersecurity while also acting ethically and professionally. This book will help you hone your skills and become a skilled and ethical Linux hacker, whether you're a beginner or an experienced hacker.Key Learnings\u003cul\u003e\n\u003cli\u003eLearning linux binaries, complex text patterns, and combining commands\u003c\/li\u003e\n\u003cli\u003eModifying and cloning IP addresses, phishing MAC ID, accessing and troubleshooting DNS\u003c\/li\u003e\n\u003cli\u003eManipulating ownership and permissions, exploring sensitive files and writing BASH scripts\u003c\/li\u003e\n\u003cli\u003eWorking around disk partitioning, filesystem errors and logical volume management\u003c\/li\u003e\n\u003cli\u003eAccessing proxy server policies, intercepting server performance and manipulating proxy servers\u003c\/li\u003e\n\u003cli\u003eSetting up APs, firewalls, VLAN, managing access, WPA encryption, and network analysis using Wireshark\u003c\/li\u003e\n\u003c\/ul\u003eTable of Contents\u003col\u003e\n\u003cli\u003eUp and Running with Linux Basics\u003c\/li\u003e\n\u003cli\u003eHow to Manipulate Text?\u003c\/li\u003e\n\u003cli\u003eAdministering Networks\u003c\/li\u003e\n\u003cli\u003eAdd and Delete Applications\u003c\/li\u003e\n\u003cli\u003eAdministering Ownership and Permissions\u003c\/li\u003e\n\u003cli\u003eExploring Shells: BASH, ZSH and FISH\u003c\/li\u003e\n\u003cli\u003eStorage Management\u003c\/li\u003e\n\u003cli\u003eWorking around Proxy Servers\u003c\/li\u003e\n\u003cli\u003eAdministering VPNs\u003c\/li\u003e\n\u003cli\u003eWorking on Wireless Networks\u003c\/li\u003e\n\u003c\/ol\u003e \u003cp\u003e\u003c\/p\u003e\u003ci\u003e[Please don't forget to check out 'Look Inside' option on thumbnail to get more details on topics and subtopics under every chapter that is covered.]\u003c\/i\u003e\u003cdiv\u003e\n\u003cstrong\u003eNumber of Pages:\u003c\/strong\u003e 216\u003c\/div\u003e\u003cdiv\u003e\n\u003cstrong\u003eDimensions:\u003c\/strong\u003e 0.46 x 9.25 x 7.5 IN\u003c\/div\u003e\u003cdiv\u003e\n\u003cstrong\u003ePublication Date:\u003c\/strong\u003e February 10, 2023\u003c\/div\u003e","brand":"Books by splitShops","offers":[{"title":"Default Title","offer_id":47446029271218,"sku":"9788196228514","price":64.78,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0770\/3891\/1666\/files\/4120de88285f5828bae7d9cbfbedcf0d.webp?v=1778733788","url":"https:\/\/box.dadyminds.org\/products\/linux-essentials-for-hackers-pentesters-kali-linux-basics-for-wireless-hacking-penetration-testing-vpns-proxy-servers-and-networking-commands-paperback","provider":"DADYMINDS BOX","version":"1.0","type":"link"}