Chapter 10

Linux Hacking

Chapter Objectives

After reading this chapter and completing the exercises, you will be able to do the following:

images Understand the security features of Linux

images Extract Linux passwords

images Understand basic Linux hacking techniques

The Linux operating system is a fairly secure system. However, it is not perfectly secure; no system is. And if your network has Linux computers, then they too must be tested. Thus, any good penetration ...

Get Penetration Testing Fundamentals: A Hands-On Guide to Reliable Security Audits now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.