Cargando…

Penetration testing with the Bash shell : make the most of the Bash shell and Kali Linux's command-line-based security assessment tools /

An easy-to-understand, step-by-step practical guide that shows you how to use the Linux Bash terminal tools to solve information security problems. If you are a penetration tester, system administrator, or developer who would like an enriching and practical introduction to the Bash shell and Kali Li...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Makan, Keith
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham, UK : Packt Pub., 2014.
Colección:Community experience distilled.
Temas:
Acceso en línea:Texto completo
Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBSCO_ocn880852492
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 140602s2014 enka o 001 0 eng d
040 |a UMI  |b eng  |e pn  |c UMI  |d N$T  |d E7B  |d DEBBG  |d DEBSZ  |d COO  |d BEDGE  |d YDXCP  |d OCLCQ  |d OCLCF  |d OCLCQ  |d K6U  |d AGLDB  |d OCLCQ  |d OCLCO  |d COCUF  |d ICA  |d CNNOR  |d OCLCQ  |d OCLCO  |d CCO  |d PIFFA  |d FVL  |d U3W  |d REB  |d D6H  |d STF  |d OCLCQ  |d VTS  |d CEF  |d NLE  |d INT  |d VT2  |d UKMGB  |d OCLCQ  |d WYU  |d OCLCO  |d G3B  |d TKN  |d OCLCQ  |d OCLCO  |d UKAHL  |d HS0  |d OCLCO  |d QGK  |d OCLCQ 
016 7 |a 018014252  |2 Uk 
019 |a 907247975  |a 961600947  |a 962702961  |a 1259205422 
020 |a 9781849695114  |q (electronic bk.) 
020 |a 1849695113  |q (electronic bk.) 
020 |a 1849695105 
020 |a 9781849695107 
020 |z 9781849695107 
029 1 |a AU@  |b 000062545629 
029 1 |a AU@  |b 000067093609 
029 1 |a DEBBG  |b BV042033141 
029 1 |a DEBSZ  |b 414186273 
029 1 |a DEBSZ  |b 484723650 
029 1 |a GBVCP  |b 882840274 
029 1 |a UKMGB  |b 018014252 
035 |a (OCoLC)880852492  |z (OCoLC)907247975  |z (OCoLC)961600947  |z (OCoLC)962702961  |z (OCoLC)1259205422 
037 |a 9781849695114  |b Packt Publishing Pvt. Ltd 
050 4 |a TK5105.59  |b .M343 2014 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Makan, Keith. 
245 1 0 |a Penetration testing with the Bash shell :  |b make the most of the Bash shell and Kali Linux's command-line-based security assessment tools /  |c Keith Makan. 
260 |a Birmingham, UK :  |b Packt Pub.,  |c 2014. 
300 |a 1 online resource :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
490 1 |a Community experience distilled 
588 0 |a Online resource; title from cover (Safari, viewed May 29, 2014). 
500 |a Includes index. 
505 0 |a Cover; Copyright; Credits; Disclaimer; About the Author; About the Reviewers; www.PacktPub.com; Preface; Chapter 1: Getting to Know Bash; Getting help from the man pages; Navigating and searching the filesystem; Navigating directories; Listing directory contents; Searching the filesystem; Directory traversal options; File testing options; File action options; Using I/O redirection; Redirecting output; Redirecting input; Using pipes; Getting to know grep; Regular expression language -- a crash course; Regular expression matcher selection options; Regular expression matching control options 
505 8 |a Output control optionsFile selection options; Summary; Further reading; Chapter 2: Customizing Your Shell; Formatting the terminal output; The prompt string; Prompt string customizations; Aliases; Customizing the command history; Protecting sensitive information from leakage; Customizing tab completion; Summary; Further reading; Chapter 3: Network Reconnaissance; Interrogating the Whois servers; Interrogating the DNS servers; Using Dig; Using dnsmap; Enumerating targets on the local network; Host discovery with Arping; Target enumeration with Nmap; Summary; Further reading 
505 8 |a Chapter 4: Exploitation and Reverse EngineeringUsing the Metasploit command-line interface; Getting started with msfcli; Using invocation modes with msfcli; Bash hacks and msfcli; Preparing payloads with Metasploit; Creating and deploying a payload; Disassembling binaries; Disassembling with Objdump; A note about the reverse engineering assembler code; Debugging binaries for dynamic analysis; Getting started with GDB; Setting execution breakpoints and watch points; Inspecting registers, memory values, and runtime information; Summary; Further reading 
505 8 |a Chapter 5: Network Exploitation and MonitoringMAC and ARP abuse; Spoofing MAC addresses; Abusing address resolution; Man-in-the-middle attacks; Ettercap DNS spoofing; Interrogating servers; SNMP interrogation; SMTP server interrogation; Brute-forcing authentication; Using Medusa; Traffic filtering with TCPDump; Getting started with TCPDump; Using the TCPDump packet filter; Assessing SSL implementation security; Using SSLyze; Bash hacks and SSLyze; Automated web application security assessment; Scanning with SkipFish; Scanning with Arachni; Summary; Further reading; Index 
520 |a An easy-to-understand, step-by-step practical guide that shows you how to use the Linux Bash terminal tools to solve information security problems. If you are a penetration tester, system administrator, or developer who would like an enriching and practical introduction to the Bash shell and Kali Linux command-line-based tools, this is the book for you. 
546 |a English. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
630 0 0 |a Kali Linux. 
630 0 0 |a UNIX Shells. 
630 0 7 |a Kali Linux.  |2 fast  |0 (OCoLC)fst01914587 
630 0 7 |a UNIX Shells.  |2 fast  |0 (OCoLC)fst01371348 
650 0 |a Penetration testing (Computer security) 
650 0 |a User interfaces (Computer systems) 
650 6 |a Tests d'intrusion. 
650 6 |a Interfaces utilisateurs (Informatique) 
650 7 |a COMPUTERS  |x Security  |x Online Safety & Privacy.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x Networking.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Langages de programmation.  |2 eclas 
650 7 |a Programmation informatique.  |2 eclas 
650 7 |a Informatique.  |2 eclas 
650 7 |a Sécurité informatique.  |2 eclas 
650 7 |a Penetration testing (Computer security)  |2 fast  |0 (OCoLC)fst01789566 
650 7 |a User interfaces (Computer systems)  |2 fast  |0 (OCoLC)fst01163191 
776 0 8 |i Print version:  |a Makan, Keith.  |t Penetration testing with the Bash shell : make the most of the Bash shell and Kali Linux's command-line-based security assessment tools.  |d Birmingham, England : Packt Publishing Ltd, ©2014  |h iii, 130 pages  |k Community experience distilled.  |z 9781849695107 
830 0 |a Community experience distilled. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781849695107/?ar  |z Texto completo 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=783562  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH26851187 
938 |a ebrary  |b EBRY  |n ebr10875448 
938 |a EBSCOhost  |b EBSC  |n 783562 
938 |a YBP Library Services  |b YANK  |n 11830274 
994 |a 92  |b IZTAP