Recent in Technology

Linux For Hackers

 ๐Ÿ”’๐Ÿง **Discover the Power of Linux For Hackers!** ๐Ÿ“š๐Ÿ”“


To enter the hacking world or The book "Linux For Hackers" is available for purchase for those who intend to learn to use Linux professionally.




๐Ÿ”ฅ **What you can learn from this book**




- About Linux operating systems; From structures


- About basic & advanced commands that can be used in the command-line


- Ways to do scripting and automation yourself


- The security knowledge you should know to continue through this


- The basics of how hacking tools can be created with Bash Script...


- Essentials for Linux System Administration


- You will be able to learn all the main requirements for changing and using the entire GNU/Linux System to your liking.




๐Ÿ’ก **Advantages of "Linux For Hackers" book**




- **Comprehensive Guide:** Lo-To-Sing is combined with some history to make it easy to understand, starting from the basics to being proficient enough to use it at an advanced level.


- **Hands-On Exercises:** Parts to know, It opens up avenues for contextual learning, includes lots of hands-on experience, and will definitely improve your Linux skills.


- **Expert Insights:** Although it is written from the Hacking Point Of View, it is a book that anyone can read because it is only necessary for other Linux users to know.


- **Stay Updated:** The best advantage is that Telegram Group Support is available and you can still ask questions, so you don't have to worry about errors and misunderstandings.




๐Ÿ“˜ **For many townships, you can receive cash on delivery**




๐Ÿš€ **Order Now:**


If you want to order it at home, you can contact us on Page messenger




๐Ÿ“š Price = 25,000 Ks






๐Ÿ“ Contents of the book (table of contents)


แ€™ာแ€ိแ€€ာ

แ€ေါแ€„်းแ€…แ€ฅ် แ€กแ€€ြောแ€„်းแ€กแ€›ာ แ€…ာแ€™ျแ€€်แ€”ှာ


Chapter 1: Introduction

1.1. แ€™ိแ€်แ€†แ€€် 1

1.2. Linux แ€žแ€™ိုแ€„်းแ€€ြောแ€„်း 1-7

1.3. Linux แ€€ို แ€œေ့แ€œာแ€–ို့ แ€˜ာแ€€ြောแ€„့်แ€œိုแ€กแ€•်แ€ာแ€œဲ 8-9

1.4. แ€˜ာแ€€ြောแ€„့် Kali แ€€ို แ€›ွေးแ€œဲ 9

1.5. Kali แ€›ဲ့ แ€žแ€™ိုแ€„်းแ€€ြောแ€„်း 10



Chapter 2: Installing Kali Linux

2.1. แ€™ိแ€်แ€†แ€€် 11

2.2. Kali แ€€ို แ€˜แ€š်แ€œို แ€แ€„်แ€žแ€„့်แ€œဲ 11-12

2.3. VirtualBox แ€™ှာ Kali แ€แ€„်แ€ြแ€„်း 12-17



Chapter 3: Studying Terms & File Systems

3.1. แ€™ိแ€်แ€†แ€€် 18

3.2. แ€žိแ€‘ားแ€žแ€„့်แ€žော แ€กแ€ေါ်แ€กแ€ေါ်แ€™ျား 18-19

3.3. File Systems แ€™ျားแ€กแ€€ြောแ€„်း 20-21



Chapter 4: Essential Linux Commands

4.1. แ€™ိแ€်แ€†แ€€် 22

4.2. Directory Command แ€™ျား 22-27

4.3. File แ€†ိုแ€„်แ€›ာ command แ€™ျား 28-32

4.4. Help & manual แ€€ို แ€œေ့แ€œာแ€ြแ€„်း 32-33

4.5. File แ€™ျား แ€›ှာแ€–ွေแ€ြแ€„်း 34-38

4.6. Copying, moving, deleting & renaming แ€€         38-41

4.7. Text manipulating แ€€ 42-44

4.8. Network แ€†ိုแ€„်แ€›ာ command แ€™ျား 44-52

4.9. แ€กแ€žုံးแ€™ျားแ€žော แ€กแ€ြား command แ€™ျားแ€กแ€€ြောแ€„်း 52-55

4.10. File Permission แ€™ျားแ€กแ€€ြောแ€„်း 55-60




Chapter 5: Installing Applications

5.1. แ€™ိแ€်แ€†แ€€် 61

5.2. APT Package Manager แ€€ 61-64

5.3. Updating, Upgrading & Dist-upgrading แ€€         64-67

5.4. Installing Applications แ€€ 68-77



Chapter 6: Challenges For Newbies 

6.1. แ€™ိแ€်แ€†แ€€် 78

6.2. Root Login แ€•ြောแ€„်းแ€œဲแ€™ှု 78-79

6.3. Enabling Root Login แ€€ 79-80

6.4. New User Login Fail แ€–ြေแ€›ှแ€„်းแ€”แ€Š်း 80-84




Chapter 7: Process Management In Linux 

7.1. แ€™ိแ€်แ€†แ€€် 85

7.2. Process แ€™ျားแ€€ို แ€›ှာแ€–ွေแ€ြแ€„်း 85-87

7.3. Process Priority แ€•ြောแ€„်းแ€œဲแ€ြแ€„်း 87-89

7.4. Killing Processes แ€€ 89-91

7.5. Running Background Processes แ€€ 91-92

7.6. Scheduling Processes แ€€ 92-97

7.7. Creating Startup Jobs แ€€ 97-98




Chapter 8: Environment Variables 

8.1. แ€™ိแ€်แ€†แ€€် 100-101

8.2. Environment Variable แ€™ျားแ€€ို แ€œေ့แ€œာแ€ြแ€„်း 101-103

8.3. Environment Variable แ€™ျားแ€€ို แ€•ြောแ€„်းแ€œဲแ€•ြแ€„်แ€†แ€„်แ€ြแ€„်း         103-105

8.4. PATH แ€•ြแ€„်แ€†แ€„်แ€•ြောแ€„်းแ€œဲแ€ြแ€„်း 105-107

8.5. User Defined Variable แ€™ျား แ€กแ€žုံးแ€•ြုแ€ြแ€„်း 108

8.6. User’s shell แ€€ို แ€•ြแ€„်แ€†แ€„်แ€ြแ€„်း 109-110




Chapter 9: Things Every Linux User Should Know

9.1. แ€™ိแ€်แ€†แ€€် 111

9.2. File System & Storage Device Management แ€€ 111-115

9.3. Storage Device แ€ွေแ€€ို แ€–ော်แ€•ြแ€ဲ့แ€•ုံแ€…ံ 115-116

9.4. File Compressing แ€€ 117-125

9.5. Bit-by-bit Copying แ€€ 125-127

9.6. Log Files แ€€ 125-130

9.7. Monitoring Apache2 Logs แ€€ 131-133

9.8. Log Rotation แ€€ 133-137

9.9. แ€กแ€‘ောแ€€်แ€กแ€‘ား แ€›ှแ€„်းแ€œแ€„်းแ€ြแ€„်း 137-140



Chapter 10: Guardians Of Privacy: Securing Identity On Linux

10.1. แ€™ိแ€်แ€†แ€€် 141-144

10.2. Tor Network แ€™ျားแ€กแ€€ြောแ€„်း 144-151

10.3. Proxy Server แ€™ျားแ€กแ€€ြောแ€„်း 151-154

10.4. VPN แ€กแ€€ြောแ€„်း 154-155

10.5. DNS Resolver แ€กแ€€ြောแ€„်း 155-157

10.6. Encrypted Mail แ€กแ€€ြောแ€„်း 157-158



Chapter 11: Bash Scripting

11.1. แ€™ိแ€်แ€†แ€€် 159-160

11.2. First Bash Program แ€€ 160-161

11.3. Comment แ€€ 161-162

11.4. Variables แ€€ 162-164

11.5. User Input แ€€ 165-166

11.6. Date & Time Formatting  แ€€ 167-168

11.7. Sleep แ€€ 168

11.8. Arithmetic Operators แ€€ 169-170

11.9. Conditional Statements แ€€ 170-177

11.10.For Loop แ€€ 178-182

11.11.While Loop  แ€€ 182-184

11.12.Until Loop แ€€ 184-186

11.13.Strings แ€€ 187-191

11.14.Functions แ€€ 191-194

11.15.Arrays แ€€ 194-197

11.16.Reading Files แ€€ 198

11.17.Writing Files แ€€ 199-200

11.18.Checking Files แ€€ 200-203

11.19.Bash Alias แ€€ 204-205



Chapter 12: Creating Hacking Tools

12.1. แ€™ိแ€်แ€†แ€€် 206

12.2. Simple Calculator Program แ€€ 206-208

12.3. Script For Scanning แ€€ 209-211

12.4. Ping Sweep Script แ€€ 211-219

12.5. Writing Login BruteForce Script แ€€ 219-222

12.5. Creating Wordlist Generator Script แ€€         222-229


References: 230




Anyone who wants to learn more about Linux can read the book "Linux For Hackers".


(Not intended for Linux professionals)




๐Ÿ’ป Anyone with a computer can learn ๐Ÿ”’


1. Facebook Page Messenger แ€™ှ แ€†แ€€်แ€žွแ€š်แ€›แ€”်

2. Telegram แ€™ှ แ€†แ€€်แ€žွแ€š်แ€›แ€”်

3. Viber แ€™ှ แ€†แ€€်แ€žွแ€š်แ€›แ€”် 



If you want to know more about the book, you can contact us through the above links.






Post a Comment

2 Comments

People