Penetration Testing with the Bash shell

0
(0)

Penetration Testing with the Bash shell
 

  • Author:Keith Makan
  • Length: 150 pages
  • Edition: 1
  • Publisher: Packt Publishing
  • Publication Date: 2014-05-26
  • ISBN-10: 1849695105
  • ISBN-13: 9781849695107
  • Sales Rank: #2275378 (See Top 100 Books)
  • Download:Register/Login to Download
  • Buy Print:Buy from amazon


    Book Description

    Make the most of the Bash shell and Kali Linux’s command-line-based security assessment tools

    Overview

    • Utilize the command line to create, run, and execute tests
    • Learn useful command line based information processing utilities and unlock the problem solving power of a Linux terminal
    • Practical demonstrations using in-depth explanations and screenshots to help you use the Linux Bash terminal to tackle a collection of common security-related problems.

    In Detail

    This book teaches you to take your problem solving capabilities to the next level with the Bash shell, to assess network and application level security by leveraging the power of the command-line tools available with Kali Linux.

    The book begins by introducing some of the fundamental bash scripting and information processing tools. Building on this, the next few chapters focus on detailing ways to customize your Bash shell using functionalities such as tab completion and rich text formatting. After the fundamental customization techniques and general purpose tools have been discussed, the book breaks into topics such as the command-line-based security tools in the Kali Linux operating system. The general approach in discussing these tools is to involve general purpose tools discussed in previous chapters to integrate security assessment tools. This is a one stop solution to learn Bash and solve information security problems.

    What you will learn from this book

    • Perform network enumeration techniques with Dig, whois, dnsenum, dnsmap, and others
    • Learn how to fuzz and reverse engineer using the Kali Linux command line tools
    • Exploit common web application vulnerabilities using skipfish, arcachi, and sqlmap
    • Accomplish man-in-the-middle attacks straight from your command line
    • Assess SSL security using sslyze and openssl
    • Carry out network traffic analysis using tcpdump

    Approach

    An easy-to-understand, step-by-step practical guide that shows you how to use the Linux Bash terminal tools to solve information security problems.

    Who this book is written for

    If you are a penetration tester, system administrator, or developer who would like an enriching and practical introduction to the Bash shell and Kali Linux command-line-based tools, this is the book for you.

    Table of Contents

    Chapter 1: Getting to Know Bash
    Chapter 2: Customizing Your Shell
    Chapter 3: Network Reconnaissance
    Chapter 4: Exploitation and Reverse Engineering
    Chapter 5: Network Exploitation and Monitoring

    中文:

    书名:Penetration Testing with the Bash shell

    充分利用Bash外壳和Kali Linux基于命令行的安全评估工具

    概述

    • 使用命令行创建、运行和执行测试
    • 学习有用的基于命令行的信息处理实用程序,并释放Linux终端解决问题的能力
    • 使用深入的解释和屏幕截图的实际演示,帮助您使用Linux Bash终端来解决一系列常见的安全相关问题。

    详细地说

    本书将教您如何使用Bash外壳将您的问题解决能力提升到一个新的水平,通过利用Kali Linux提供的命令行工具的强大功能来评估网络和应用程序级的安全性。

    本书首先介绍了一些基本的bash脚本和信息处理工具。在此基础上,接下来的几章将重点介绍如何使用制表符完成和富文本格式等功能来定制Bash外壳。在讨论了基本的定制技术和通用工具之后,本书将深入讨论Kali Linux操作系统中基于命令行的安全工具等主题。讨论这些工具的一般方法是使用前面章节中讨论的通用工具来集成安全评估工具。这是学习Bash,解决信息安全问题的一站式解决方案。

    你将从这本书中学到什么

    • 使用dig、whis、dnsenum、dnsmap和其他命令执行网络枚举技术
    • 了解如何使用Kali Linux命令行工具进行模糊处理和反向工程
    • 使用skipFish、arcachi和sqlmap利用常见的Web应用程序漏洞
    • 直接从命令行完成中间人攻击
    • 使用sslyze和openssl评估SSL安全性
    • 使用tcpump执行网络流量分析

    Approach

    这是一本简单易懂、循序渐进的实用指南,向您展示如何使用Linux Bash终端工具来解决信息安全问题。

    这本书是为谁写的

    如果您是一名渗透测试人员、系统管理员或开发人员,希望对Bash Shell和Kali Linux基于命令行的工具进行丰富和实用的介绍,这本书是为您准备的。

    目录表

    第一章:了解巴什
    第2章:定制您的外壳
    Chapter 3: Network Reconnaissance
    第4章:利用和逆向工程
    第五章:网络利用和监控

  • 下载电子版:下载地址
  • 购买纸质版:亚马逊商城

    点击星号评分!

    平均分 0 / 5. 投票数: 0

    还没有投票!请为他投一票。

  • 推荐阅读

    评论 抢沙发

    评论前必须登录!

     

    登录

    找回密码

    注册