O'Reilly logo

Hacker Techniques, Tools, and Incident Handling, 2nd Edition by Oriyano

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER

 

12

Linux and Penetration Testing

IN TODAY’S BUSINESS ENVIRONMENT, you are likely to encounter operating systems other than the familiar Windows desktop. While Windows still lays claim to a large percentage of the computers in the world, it is not the only operating system out there. Mac OS, UNIX, and Linux are likely to cross your path at some point.

As a security professional, you always need to have an understanding of all the tools available to you and to be able to use them. This requires some knowledge of the Linux OS. The Linux OS is different from the Windows operating system and will require some effort to learn. But once you learn the OS, you will have many more tools available to you to assess the security of your ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required