Skip to main content

Linux

Linux Basics

In order to become a good ethical hacker or penetration tester, you need to be conversant with
Linux, which is by far one of the most powerful operating systems. Linux is really good for ethical
hacking and penetration testing because it is compatible with a wide variety of related tools and
software, whereas other operating systems such as Mac and Windows support fewer of these software
and tools. In this chapter, I will teach you some of the very basics of operating a Linux OS. If
you are already familiar with Linux basics, you can skip this chapter.

One of the most common questions asked in many forums is “Which Linux distro should I
use?” As there are tons of Linux distros such as Ubuntu, Fedora, Knoppix, and BackTrack you
can use any Linux distro you want as all work in a similar manner. However, I suggest you use
BackTrack if you really wish to dig deeper into this subject because it is all encompassing from a
penetration tester’s perspective.

Major Linux Operating Systems

Before talking about BackTrack, let’s take a look at some of the Linux-based distros that you will
encounter very often:

Redhat Linux—Used mostly for administration purpose.
Debian Linux—Designed for using only in open source software.
Ubuntu Linux—Designed mostly for personal use.
Mac OS X—Used in all Apple computers.
Solaris—Used in many commercial environments.
BackTrack Linux—Used mostly for penetration testing.

 
File Structure inside of Linux

On a Linux system, most everything is a file, and if it is not a file, then it is a process.
Here is a general diagram for file structure in Linux.



Directories—Files that are lists of other files.
Special file—The mechanism used for inout and output. /dev are special files.
Links—A system to make file or directory visible in multiple parts of the systems.
Sockets—A special file type, similar to TCP/IP sockets providing inter-process networking.
Pipes—More or less like sockets; they form a way for process to communicate with each other
with out using network socket.
File types in a long list:


Comments

  1. Softtrick: Linux >>>>> Download Now

    >>>>> Download Full

    Softtrick: Linux >>>>> Download LINK

    >>>>> Download Now

    Softtrick: Linux >>>>> Download Full

    >>>>> Download LINK

    ReplyDelete

Post a Comment

Popular posts from this blog

How to crack iOS device password.

Cracking iOS Passwords I’d venture to guess that many phone and tablet passwords ( really, they’re just 4-digit PINs) can be guessed outright. A mobile device gets lost or stolen and all the person recovering it has to do is try some basic number combinations such as 1234, 1212, or 0000. Soon, voilĂ ! — the system is unlocked. Many phones and tablets running iOS, Android, and Blackberry OS are configured to wipe the device if the incorrect password is entered X number of times (often 10 failed attempts). A reasonable security control indeed. But what else can be done? Some commercial tools can be used to crack simple passwords/PINs and recover information from lost or stolen devices or devices undergoing a forensics investigation.

How to activate your windows

RemoveWat       Windows 7  Build 7600  This copy of windows is not genuine This is because your windows is not activated. To solve this you need activation key, which is not free. In this article i'll show you how to activate your window without paying  single bucks. All you need is one small application.

BackTrack and how to install it.

What Is BackTrack? So now that you are familiar with Linux, let me introduce you to BackTrack. BackTrack is a Linux penetration testing distro developed by Offensive Security especially for ethical hackers and penetration testers. It contains all the popular tools and software used for pen testing a variety of services, networks, and devices. BackTrack 5 is the latest version of the Linux penetration testing distro at the time of writing this chapter. It comes in two flavors: Gnome and KDE. Gnome is an Ubuntu-based Linux operating system that has officially been introduced only in the latest version of BackTrack. Here is a screenshot of BackTrack 5.