
Linux For Hackers: Getting Started with Networking, WiFi Hacking, and Python Scripting (eBook, ePUB)
PAYBACK Punkte
0 °P sammeln!
In this book, you'll start with the basics of Linux and networking, then move into Wi-Fi hacking, password cracking, Python scripting, reverse shells, and securing your system.You won't get lost in theory or boring lectures. Instead, you'll jump straight into real projects and practical stuff you can actually use.What You'll Learn:Networking Basics· Learn Essential Commands.· Tshark Commands to Monitor Networks.· Capture Usernames and Passwords with Tshark.Wi-Fi Hacking· Test your Wireless Adapter for Hacking Compatibility.· Perform a Denial of Service Attack on a Wireless Network.· Crac...
In this book, you'll start with the basics of Linux and networking, then move into Wi-Fi hacking, password cracking, Python scripting, reverse shells, and securing your system.
You won't get lost in theory or boring lectures. Instead, you'll jump straight into real projects and practical stuff you can actually use.
What You'll Learn:
Networking Basics
· Learn Essential Commands.
· Tshark Commands to Monitor Networks.
· Capture Usernames and Passwords with Tshark.
Wi-Fi Hacking
· Test your Wireless Adapter for Hacking Compatibility.
· Perform a Denial of Service Attack on a Wireless Network.
· Crack Wi-Fi Passwords using Hashcat.
· Create a Fake Captive Portal Login Page.
Password Attacks
· Crack Password Hashes using Hashcat and John the Ripper.
· Crack Password-Protected ZIP Files.
· Bypass Windows Passwords using Kali Linux.
Python Scripting
· Build a Network Scanner and FTP Cracker.
· Create a Keylogger using Python.
· Build and Customize Wordlists.
· Automate Wi-Fi Attacks with Python.
· Create a Fake Captive Portal with Flask.
Reverse Shells
· Understand how Reverse Shells Work.
· Build them using Python and Metasploit.
· Detect and Block them on Linux Systems.
Security
· Encrypt and Decrypt Files with GPG.
· Hide Secret Data Inside an Image.
· Detect Malicious Wi-Fi Attacks with Wireshark.
· Protect your Wi-Fi from Brute-Force Attacks.
· Monitor System Logs for Suspicious Activity.
By the end of this book, you'll be confident using Linux for ethical hacking. With practical examples and no fluff, this book helps you build skills that you can use in real-life situations.
I 'm not responsible for what you do with this book. The content is for ETHICAL HACKING educational purposes only, not intended for malicious intent.
You won't get lost in theory or boring lectures. Instead, you'll jump straight into real projects and practical stuff you can actually use.
What You'll Learn:
Networking Basics
· Learn Essential Commands.
· Tshark Commands to Monitor Networks.
· Capture Usernames and Passwords with Tshark.
Wi-Fi Hacking
· Test your Wireless Adapter for Hacking Compatibility.
· Perform a Denial of Service Attack on a Wireless Network.
· Crack Wi-Fi Passwords using Hashcat.
· Create a Fake Captive Portal Login Page.
Password Attacks
· Crack Password Hashes using Hashcat and John the Ripper.
· Crack Password-Protected ZIP Files.
· Bypass Windows Passwords using Kali Linux.
Python Scripting
· Build a Network Scanner and FTP Cracker.
· Create a Keylogger using Python.
· Build and Customize Wordlists.
· Automate Wi-Fi Attacks with Python.
· Create a Fake Captive Portal with Flask.
Reverse Shells
· Understand how Reverse Shells Work.
· Build them using Python and Metasploit.
· Detect and Block them on Linux Systems.
Security
· Encrypt and Decrypt Files with GPG.
· Hide Secret Data Inside an Image.
· Detect Malicious Wi-Fi Attacks with Wireshark.
· Protect your Wi-Fi from Brute-Force Attacks.
· Monitor System Logs for Suspicious Activity.
By the end of this book, you'll be confident using Linux for ethical hacking. With practical examples and no fluff, this book helps you build skills that you can use in real-life situations.
I 'm not responsible for what you do with this book. The content is for ETHICAL HACKING educational purposes only, not intended for malicious intent.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, CY, CZ, D, DK, EW, E, FIN, F, GR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.