Skip to Content
Penetration Testing Fundamentals: A Hands-On Guide to Reliable Security Audits
book

Penetration Testing Fundamentals: A Hands-On Guide to Reliable Security Audits

by Chuck Easttom
March 2018
Beginner
448 pages
11h 51m
English
Pearson IT Certification
Content preview from Penetration Testing Fundamentals: A Hands-On Guide to Reliable Security Audits

Chapter 10

Linux Hacking

Chapter Objectives

After reading this chapter and completing the exercises, you will be able to do the following:

images Understand the security features of Linux

images Extract Linux passwords

images Understand basic Linux hacking techniques

The Linux operating system is a fairly secure system. However, it is not perfectly secure; no system is. And if your network has Linux computers, then they too must be tested. Thus, any good penetration ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Penetration Testing and Network Defense

Penetration Testing and Network Defense

Andrew Whitaker, Daniel P. Newman

Publisher Resources

ISBN: 9780134854564