Chapter 10
Linux Hacking
Chapter Objectives
After reading this chapter and completing the exercises, you will be able to do the following:
Understand the security features of Linux
Extract Linux passwords
Understand basic Linux hacking techniques
The Linux operating system is a fairly secure system. However, it is not perfectly secure; no system is. And if your network has Linux computers, then they too must be tested. Thus, any good penetration ...
Get Penetration Testing Fundamentals: A Hands-On Guide to Reliable Security Audits now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.