Penetration testing with the Bash shell : make the most of the Bash shell and Kali Linux's command-line-based security assessment tools /
An easy-to-understand, step-by-step practical guide that shows you how to use the Linux Bash terminal tools to solve information security problems. If you are a penetration tester, system administrator, or developer who would like an enriching and practical introduction to the Bash shell and Kali Li...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Birmingham, UK :
Packt Pub.,
2014.
|
Colección: | Community experience distilled.
|
Temas: | |
Acceso en línea: | Texto completo Texto completo |
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | EBSCO_ocn880852492 | ||
003 | OCoLC | ||
005 | 20231017213018.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 140602s2014 enka o 001 0 eng d | ||
040 | |a UMI |b eng |e pn |c UMI |d N$T |d E7B |d DEBBG |d DEBSZ |d COO |d BEDGE |d YDXCP |d OCLCQ |d OCLCF |d OCLCQ |d K6U |d AGLDB |d OCLCQ |d OCLCO |d COCUF |d ICA |d CNNOR |d OCLCQ |d OCLCO |d CCO |d PIFFA |d FVL |d U3W |d REB |d D6H |d STF |d OCLCQ |d VTS |d CEF |d NLE |d INT |d VT2 |d UKMGB |d OCLCQ |d WYU |d OCLCO |d G3B |d TKN |d OCLCQ |d OCLCO |d UKAHL |d HS0 |d OCLCO |d QGK |d OCLCQ | ||
016 | 7 | |a 018014252 |2 Uk | |
019 | |a 907247975 |a 961600947 |a 962702961 |a 1259205422 | ||
020 | |a 9781849695114 |q (electronic bk.) | ||
020 | |a 1849695113 |q (electronic bk.) | ||
020 | |a 1849695105 | ||
020 | |a 9781849695107 | ||
020 | |z 9781849695107 | ||
029 | 1 | |a AU@ |b 000062545629 | |
029 | 1 | |a AU@ |b 000067093609 | |
029 | 1 | |a DEBBG |b BV042033141 | |
029 | 1 | |a DEBSZ |b 414186273 | |
029 | 1 | |a DEBSZ |b 484723650 | |
029 | 1 | |a GBVCP |b 882840274 | |
029 | 1 | |a UKMGB |b 018014252 | |
035 | |a (OCoLC)880852492 |z (OCoLC)907247975 |z (OCoLC)961600947 |z (OCoLC)962702961 |z (OCoLC)1259205422 | ||
037 | |a 9781849695114 |b Packt Publishing Pvt. Ltd | ||
050 | 4 | |a TK5105.59 |b .M343 2014 | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 0 | 4 | |a 005.8 |2 23 |
049 | |a UAMI | ||
100 | 1 | |a Makan, Keith. | |
245 | 1 | 0 | |a Penetration testing with the Bash shell : |b make the most of the Bash shell and Kali Linux's command-line-based security assessment tools / |c Keith Makan. |
260 | |a Birmingham, UK : |b Packt Pub., |c 2014. | ||
300 | |a 1 online resource : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file | ||
490 | 1 | |a Community experience distilled | |
588 | 0 | |a Online resource; title from cover (Safari, viewed May 29, 2014). | |
500 | |a Includes index. | ||
505 | 0 | |a Cover; Copyright; Credits; Disclaimer; About the Author; About the Reviewers; www.PacktPub.com; Preface; Chapter 1: Getting to Know Bash; Getting help from the man pages; Navigating and searching the filesystem; Navigating directories; Listing directory contents; Searching the filesystem; Directory traversal options; File testing options; File action options; Using I/O redirection; Redirecting output; Redirecting input; Using pipes; Getting to know grep; Regular expression language -- a crash course; Regular expression matcher selection options; Regular expression matching control options | |
505 | 8 | |a Output control optionsFile selection options; Summary; Further reading; Chapter 2: Customizing Your Shell; Formatting the terminal output; The prompt string; Prompt string customizations; Aliases; Customizing the command history; Protecting sensitive information from leakage; Customizing tab completion; Summary; Further reading; Chapter 3: Network Reconnaissance; Interrogating the Whois servers; Interrogating the DNS servers; Using Dig; Using dnsmap; Enumerating targets on the local network; Host discovery with Arping; Target enumeration with Nmap; Summary; Further reading | |
505 | 8 | |a Chapter 4: Exploitation and Reverse EngineeringUsing the Metasploit command-line interface; Getting started with msfcli; Using invocation modes with msfcli; Bash hacks and msfcli; Preparing payloads with Metasploit; Creating and deploying a payload; Disassembling binaries; Disassembling with Objdump; A note about the reverse engineering assembler code; Debugging binaries for dynamic analysis; Getting started with GDB; Setting execution breakpoints and watch points; Inspecting registers, memory values, and runtime information; Summary; Further reading | |
505 | 8 | |a Chapter 5: Network Exploitation and MonitoringMAC and ARP abuse; Spoofing MAC addresses; Abusing address resolution; Man-in-the-middle attacks; Ettercap DNS spoofing; Interrogating servers; SNMP interrogation; SMTP server interrogation; Brute-forcing authentication; Using Medusa; Traffic filtering with TCPDump; Getting started with TCPDump; Using the TCPDump packet filter; Assessing SSL implementation security; Using SSLyze; Bash hacks and SSLyze; Automated web application security assessment; Scanning with SkipFish; Scanning with Arachni; Summary; Further reading; Index | |
520 | |a An easy-to-understand, step-by-step practical guide that shows you how to use the Linux Bash terminal tools to solve information security problems. If you are a penetration tester, system administrator, or developer who would like an enriching and practical introduction to the Bash shell and Kali Linux command-line-based tools, this is the book for you. | ||
546 | |a English. | ||
590 | |a O'Reilly |b O'Reilly Online Learning: Academic/Public Library Edition | ||
590 | |a eBooks on EBSCOhost |b EBSCO eBook Subscription Academic Collection - Worldwide | ||
630 | 0 | 0 | |a Kali Linux. |
630 | 0 | 0 | |a UNIX Shells. |
630 | 0 | 7 | |a Kali Linux. |2 fast |0 (OCoLC)fst01914587 |
630 | 0 | 7 | |a UNIX Shells. |2 fast |0 (OCoLC)fst01371348 |
650 | 0 | |a Penetration testing (Computer security) | |
650 | 0 | |a User interfaces (Computer systems) | |
650 | 6 | |a Tests d'intrusion. | |
650 | 6 | |a Interfaces utilisateurs (Informatique) | |
650 | 7 | |a COMPUTERS |x Security |x Online Safety & Privacy. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x Networking. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Langages de programmation. |2 eclas | |
650 | 7 | |a Programmation informatique. |2 eclas | |
650 | 7 | |a Informatique. |2 eclas | |
650 | 7 | |a Sécurité informatique. |2 eclas | |
650 | 7 | |a Penetration testing (Computer security) |2 fast |0 (OCoLC)fst01789566 | |
650 | 7 | |a User interfaces (Computer systems) |2 fast |0 (OCoLC)fst01163191 | |
776 | 0 | 8 | |i Print version: |a Makan, Keith. |t Penetration testing with the Bash shell : make the most of the Bash shell and Kali Linux's command-line-based security assessment tools. |d Birmingham, England : Packt Publishing Ltd, ©2014 |h iii, 130 pages |k Community experience distilled. |z 9781849695107 |
830 | 0 | |a Community experience distilled. | |
856 | 4 | 0 | |u https://learning.oreilly.com/library/view/~/9781849695107/?ar |z Texto completo |
856 | 4 | 0 | |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=783562 |z Texto completo |
938 | |a Askews and Holts Library Services |b ASKH |n AH26851187 | ||
938 | |a ebrary |b EBRY |n ebr10875448 | ||
938 | |a EBSCOhost |b EBSC |n 783562 | ||
938 | |a YBP Library Services |b YANK |n 11830274 | ||
994 | |a 92 |b IZTAP |