万本电子书0元读

万本电子书0元读

顶部广告

Penetration Testing with the Bash shell电子书

售       价:¥

3人正在读 | 0人评论 9.8

作       者:Keith Makan

出  版  社:Packt Publishing

出版时间:2014-05-26

字       数:54.7万

所属分类: 进口书 > 外文原版书 > 电脑/网络

温馨提示:数字商品不支持退换货,不提供源文件,不支持导出打印

为你推荐

  • 读书简介
  • 目录
  • 累计评论(0条)
  • 读书简介
  • 目录
  • 累计评论(0条)
An easy-to-understand, step-by-step practical guide that shows you how to use the Linux Bash terminal tools to solve information security problems. If you are a penetration tester, system administrator, or developer who would like an enriching and practical introduction to the Bash shell and Kali Linux command-line-based tools, this is the book for you.
目录展开

Penetration Testing with the Bash shell

Table of Contents

Penetration Testing with the Bash shell

Credits

Disclaimer

About the Author

About the Reviewers

www.PacktPub.com

Support files, eBooks, discount offers, and more

Why subscribe?

Free access for Packt account holders

Preface

What this book covers

What you need for this book

Who this book is for

Conventions

Reader feedback

Customer support

Downloading the example code

Errata

Piracy

Questions

1. Getting to Know Bash

Getting help from the man pages

Navigating and searching the filesystem

Navigating directories

Listing directory contents

Searching the filesystem

Directory traversal options

File testing options

File action options

Using I/O redirection

Redirecting output

Redirecting input

Using pipes

Getting to know grep

Regular expression language – a crash course

Regular expression matcher selection options

Regular expression matching control options

Output control options

File selection options

Summary

Further reading

2. Customizing Your Shell

Formatting the terminal output

The prompt string

Prompt string customizations

Aliases

Customizing the command history

Protecting sensitive information from leakage

Customizing tab completion

Summary

Further reading

3. Network Reconnaissance

Interrogating the Whois servers

Interrogating the DNS servers

Using Dig

Using dnsmap

Enumerating targets on the local network

Host discovery with Arping

Target enumeration with Nmap

Summary

Further reading

4. Exploitation and Reverse Engineering

Using the Metasploit command-line interface

Getting started with msfcli

Using invocation modes with msfcli

Bash hacks and msfcli

Preparing payloads with Metasploit

Creating and deploying a payload

Disassembling binaries

Disassembling with Objdump

A note about the reverse engineering assembler code

Debugging binaries for dynamic analysis

Getting started with GDB

Setting execution breakpoints and watch points

Inspecting registers, memory values, and runtime information

Summary

Further reading

5. Network Exploitation and Monitoring

MAC and ARP abuse

Spoofing MAC addresses

Abusing address resolution

Man-in-the-middle attacks

Ettercap DNS spoofing

Interrogating servers

SNMP interrogation

SMTP server interrogation

Brute-forcing authentication

Using Medusa

Traffic filtering with TCPDump

Getting started with TCPDump

Using the TCPDump packet filter

Assessing SSL implementation security

Using SSLyze

Bash hacks and SSLyze

Automated web application security assessment

Scanning with SkipFish

Scanning with Arachni

Summary

Further reading

Index

累计评论(0条) 0个书友正在讨论这本书 发表评论

发表评论

发表评论,分享你的想法吧!

买过这本书的人还买过

读了这本书的人还在读

回顶部