官术网_书友最值得收藏!

What this book covers

Chapter 1, Getting to Know Bash, introduces readers to the fundamental concepts involved in using the bash terminal. It covers utilities that readers will find helpful in their day-to-day activities as penetration testers, system administrators, and security-orientated developers.

Chapter 2, Customizing Your Shell, focuses on tips and tricks that readers can use to customize the behavior of the shells to suit their needs. It shows readers how to customize the cursor to format text, how to control command history securely, how to use aliases, and how to enable tab completion to make command-line utilities more user-friendly and easy to use.

Chapter 3, Network Reconnaissance, covers command-line utilities that readers can use to perform target enumeration and exfilterate information from common network services. This chapter introduces numerous tools, including Dnsmap, Nmap, and Whois among others, as well as useful ways to integrate these tools with the other command-line tools.

Chapter 4, Exploitation and Reverse Engineering, focuses on demonstrating and discussing the fundamental reverse engineering and host-based exploitation command-line driven tools. The chapter covers tools such as msfcli, msfpayload, GNU gdb, and various techniques, and shows how readers can combine these tools in useful ways with the help of bash scripting.

Chapter 5, Network Exploitation and Monitoring, shifts the focus to network exploitation tools and the utilities that the readers will likely use in their day-to-day penetration tests. The chapter covers tools such as ARPSpoof, Ettercap, and SSLyze, and also introduces readers to useful bash scripts and commands that optimize the usage of these commands and automates many common tasks.

主站蜘蛛池模板: 印江| 志丹县| 大悟县| 遵化市| 深水埗区| 都匀市| 寻甸| 新安县| 互助| 璧山县| 临安市| 贵溪市| 克拉玛依市| 革吉县| 全椒县| 峨眉山市| 云霄县| 深泽县| 偃师市| 永宁县| 黑河市| 大厂| 搜索| 婺源县| 普格县| 安龙县| 合山市| 崇左市| 平昌县| 资中县| 桃源县| 宜章县| 利川市| 南部县| 扶沟县| 自治县| 大庆市| 郯城县| 林州市| 井陉县| 乐昌市|