• Complain

Keith Makan [Keith Makan] - Penetration Testing with the Bash shell

Here you can read online Keith Makan [Keith Makan] - Penetration Testing with the Bash shell full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2014, publisher: Packt Publishing, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Keith Makan [Keith Makan] Penetration Testing with the Bash shell
  • Book:
    Penetration Testing with the Bash shell
  • Author:
  • Publisher:
    Packt Publishing
  • Genre:
  • Year:
    2014
  • Rating:
    5 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 100
    • 1
    • 2
    • 3
    • 4
    • 5

Penetration Testing with the Bash shell: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Penetration Testing with the Bash shell" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Make the most of the Bash shell and Kali Linuxs commandlinebased security assessment tools

In Detail

This book teaches you to take your problem solving capabilities to the next level with the Bash shell, to assess network and application level security by leveraging the power of the command-line tools available with Kali Linux.

The book begins by introducing some of the fundamental bash scripting and information processing tools. Building on this, the next few chapters focus on detailing ways to customize your Bash shell using functionalities such as tab completion and rich text formatting. After the fundamental customization techniques and general purpose tools have been discussed, the book breaks into topics such as the command-line-based security tools in the Kali Linux operating system. The general approach in discussing these tools is to involve general purpose tools discussed in previous chapters to integrate security assessment tools. This is a one stop solution to learn Bash and solve information security problems.

What You Will Learn

  • Perform network enumeration techniques with Dig, whois, dnsenum, dnsmap, and others
  • Learn how to fuzz and reverse engineer using the Kali Linux command line tools
  • Exploit common web application vulnerabilities using skipfish, arcachi, and sqlmap
  • Accomplish man-in-the-middle attacks straight from your command line
  • Assess SSL security using sslyze and openssl
  • Carry out network traffic analysis using tcpdump

Downloading the example code for this book. You can download the example code files for all Packt books you have purchased from your account at http://www.PacktPub.com. If you purchased this book elsewhere, you can visit http://www.PacktPub.com/support and register to have the files e-mailed directly to you.

Keith Makan [Keith Makan]: author's other books


Who wrote Penetration Testing with the Bash shell? Find out the surname, the name of the author of the book and a list of all author's works by series.

Penetration Testing with the Bash shell — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Penetration Testing with the Bash shell" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Index
A
  • -amin n option /
  • -atime n option /
  • addressing modes, options
    • -s MAC /
    • -S IP /
    • -t MAC /
    • -T IP /
  • aliases
    • about /
  • Arachni
    • about /
    • used, for assessing automated web application /
  • ARP
    • abusing /
  • Arping
    • about /
    • used, for performing host discovery /
  • ArpSpoof
    • about /
  • automated web application security assessment
    • about /
    • SkipFish used /
    • Arachni used /
B
  • .bashrc file /
  • .bash_history file /
  • bash hacks
    • and msfcli /
    • and SSLyze /
  • bash terminal
    • about /
  • binaries
    • disassembling /
    • disassembling, with Objdump /
    • debugging, for dynamic analysis /
    • running, in GDB /
    • execution breakpoints, setting /
    • watch points, setting /
    • registers, inspecting /
    • memory values, inspecting /
    • runtime information, inspecting /
  • Brute-forcing authentication
    • about /
    • Medusa used /
C
  • -c COUNT option /
  • -c CSV-RESULTS-FILE option /
  • cd command /
  • Cipher Block Chaining (CBC) /
  • CISC
    • about /
  • command history
    • customizing /
    • sensitive information, protecting from leakage /
  • control characters, regular expressions
    • ^ /
    • $ /
    • [] /
    • () /
    • | /
    • ? /
    • + /
    • {n} /
    • {n,m} /
  • control sequences
    • about /
    • [0m /
    • [1m /
    • [2m /
    • [4m /
    • [5m /
    • [7m /
    • [8m /
  • customization, command history /
  • customization, tabcompletion /
  • customizations, prompt string /
D
  • -daystart option /
  • -delete option /
  • -d option /
  • Dig
    • about /
    • used, for performing DNS interrogation /
  • directories
    • navigating /
  • directory contents
    • listing /
  • directory traversal options, find command
    • -maxdepth n /
    • -mindepth n /
    • -daystart /
    • -mount /
  • dnsenum
    • about /
  • DNS interrogation
    • performing, Dig used /
    • performing, dnsmap used /
  • dnsmap
    • about /
    • used, for performing DNS interrogation /
  • dnsmap options
    • -w WORDLIST /
    • -r RESULTS-FILE /
    • -c CSV-RESULTS-FILE /
    • -i IP-IGNORE-LIST /
  • DNS servers
    • about /
    • interrogating /
  • DNS spoofing attack
    • setting up, with Ettercap /
  • dynamic analysis
    • binaries, debugging for /
E
  • -execdir option /
  • -exec option /
  • -executable | -readable | -writable option /
  • echo command
    • about /
  • ELF /
  • environment variables, command history
    • HISTSIZE /
    • HISTFILE /
    • HISTFILEZIE /
    • HISTCONTROL /
  • ERE
    • about /
  • Ettercap
    • about /
    • DNS spoofing attack, setting up with /
  • eval command /
  • execution breakpoints
    • setting /
F
  • file action options, find command
    • -delete /
    • -exec /
    • -execdir /
    • -print0 /
    • -ls /
  • file descriptors
    • about /
  • file selection options
    • about /
    • -a or --text /
    • --binary-files=TYPE /
    • -D ACTION or --devices=ACTION /
    • --exclude=GLOB /
    • -R, -r, or --recursive /
  • filesystem
    • navigating /
    • searching /
  • file testing options
    • about /
    • -amin n /
    • -atime n /
    • -mmin n /
    • -mtime n /
    • -executable | -readable | -writable /
    • -perm /
    • -mode /
    • -iname nAmE /
    • -regex pattern /
  • Find command /
  • find command
    • about /
  • Fping
    • about /
G
  • GDB
    • about /
    • binaries, running in /
  • grep utility
    • about /
H
  • help function /
  • HISTCONTROL environment variable /
  • HISTFILE environment variable /
  • HISTFILEZIE environment variable /
  • HISTSIZE environment variable /
  • host discovery
    • performing, Arping used /
  • host discovery options
    • -PE /
    • -PP /
  • Hping
    • about /
I
  • -i IP-IGNORE-LIST option /
  • -iname nAmE option /
  • -i option /
  • I/O redirection
    • about /
    • using /
    • output, redirecting /
    • input, redirecting /
  • ifconfig commands
    • about /
  • invocation modes
    • using, with msfcli /
  • invocation options, ls command
    • -a --all /
    • -d -directory /
    • -h /
    • -i /
    • -l /
    • -R --recursive /
    • -S /
    • -x /
K
  • Kali Linux
    • about /
L
  • -ls option /
  • local network
    • targets, enumerating on /
  • ls command /
    • invocation options /
M
  • -maxdepth n option /
  • -mindepth n option /
  • -mmin n option /
  • -mode option /
  • -mount option /
  • -mtime n option /
  • MAC
    • about /
  • MAC addresses
    • spoofing /
  • macchanger tool /
  • MAC spoofing attack
    • about /
  • man files
    • about /
  • man pages
    • help, obtaining from /
  • matcher selection options, regular expression
    • -E or --extended-regexp /
    • -F or --fixed-strings /
    • -P or --perl-regexp /
  • matching control options, regular expression
    • -e PATTERN or --regexp=PATTERN /
    • -f or --file=FILE /
    • -v or --invert-match /
    • -w or --word-regexp /
    • -x or --line-regexp /
  • Medusa
    • about /
  • memory values
    • inspecting /
  • Metasploit
    • about /
    • payloads, preparing with /
  • Meterpreter
    • about /
  • MITM attacks
    • about /
    • Ettercap DNS spoofing /
  • msfcli
    • using /
    • usage specification /
    • [MODULE] option /
    • [OPTIONS] option /
    • [MODE] option /
    • invocation modes, using with /
    • and bash hacks /
  • msfpayload command /
N
  • Nmap
    • about /
    • targets, enumerating with /
O
  • Objdump
    • used, for disassembling binaries /
  • options, Arping
    • -c COUNT /
    • -d /
    • -i /
    • -p /
    • -r /
  • options, ArpSpoof
    • -i /
    • -c /
    • -t /
    • -r /
    • GATEWAY /
  • options, cd command
    • -L /
    • -P /
  • options, find command
    • -H /
    • -L /
    • -P /
  • options, Nmap
    • -PS TCP SYN flag scan /
    • -PA TCP ACK flag scan /
    • -PO IP protocol ping /
  • options, smtp-user-enum tool
    • -M /
    • -u /
    • -U /
    • -t /
    • -T /
    • -h /
    • -v /
  • options, TCPDump
    • -i /
    • -c /
    • -w /
Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Penetration Testing with the Bash shell»

Look at similar books to Penetration Testing with the Bash shell. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Penetration Testing with the Bash shell»

Discussion, reviews of the book Penetration Testing with the Bash shell and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.