|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocn880852492 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
140602s2014 enka o 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d N$T
|d E7B
|d DEBBG
|d DEBSZ
|d COO
|d BEDGE
|d YDXCP
|d OCLCQ
|d OCLCF
|d OCLCQ
|d K6U
|d AGLDB
|d OCLCQ
|d OCLCO
|d COCUF
|d ICA
|d CNNOR
|d OCLCQ
|d OCLCO
|d CCO
|d PIFFA
|d FVL
|d U3W
|d REB
|d D6H
|d STF
|d OCLCQ
|d VTS
|d CEF
|d NLE
|d INT
|d VT2
|d UKMGB
|d OCLCQ
|d WYU
|d OCLCO
|d G3B
|d TKN
|d OCLCQ
|d OCLCO
|d UKAHL
|d HS0
|d OCLCO
|d QGK
|d OCLCQ
|
016 |
7 |
|
|a 018014252
|2 Uk
|
019 |
|
|
|a 907247975
|a 961600947
|a 962702961
|a 1259205422
|
020 |
|
|
|a 9781849695114
|q (electronic bk.)
|
020 |
|
|
|a 1849695113
|q (electronic bk.)
|
020 |
|
|
|a 1849695105
|
020 |
|
|
|a 9781849695107
|
020 |
|
|
|z 9781849695107
|
029 |
1 |
|
|a AU@
|b 000062545629
|
029 |
1 |
|
|a AU@
|b 000067093609
|
029 |
1 |
|
|a DEBBG
|b BV042033141
|
029 |
1 |
|
|a DEBSZ
|b 414186273
|
029 |
1 |
|
|a DEBSZ
|b 484723650
|
029 |
1 |
|
|a GBVCP
|b 882840274
|
029 |
1 |
|
|a UKMGB
|b 018014252
|
035 |
|
|
|a (OCoLC)880852492
|z (OCoLC)907247975
|z (OCoLC)961600947
|z (OCoLC)962702961
|z (OCoLC)1259205422
|
037 |
|
|
|a 9781849695114
|b Packt Publishing Pvt. Ltd
|
050 |
|
4 |
|a TK5105.59
|b .M343 2014
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Makan, Keith.
|
245 |
1 |
0 |
|a Penetration testing with the Bash shell :
|b make the most of the Bash shell and Kali Linux's command-line-based security assessment tools /
|c Keith Makan.
|
260 |
|
|
|a Birmingham, UK :
|b Packt Pub.,
|c 2014.
|
300 |
|
|
|a 1 online resource :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
490 |
1 |
|
|a Community experience distilled
|
588 |
0 |
|
|a Online resource; title from cover (Safari, viewed May 29, 2014).
|
500 |
|
|
|a Includes index.
|
505 |
0 |
|
|a Cover; Copyright; Credits; Disclaimer; About the Author; About the Reviewers; www.PacktPub.com; Preface; Chapter 1: Getting to Know Bash; Getting help from the man pages; Navigating and searching the filesystem; Navigating directories; Listing directory contents; Searching the filesystem; Directory traversal options; File testing options; File action options; Using I/O redirection; Redirecting output; Redirecting input; Using pipes; Getting to know grep; Regular expression language -- a crash course; Regular expression matcher selection options; Regular expression matching control options
|
505 |
8 |
|
|a Output control optionsFile selection options; Summary; Further reading; Chapter 2: Customizing Your Shell; Formatting the terminal output; The prompt string; Prompt string customizations; Aliases; Customizing the command history; Protecting sensitive information from leakage; Customizing tab completion; Summary; Further reading; Chapter 3: Network Reconnaissance; Interrogating the Whois servers; Interrogating the DNS servers; Using Dig; Using dnsmap; Enumerating targets on the local network; Host discovery with Arping; Target enumeration with Nmap; Summary; Further reading
|
505 |
8 |
|
|a Chapter 4: Exploitation and Reverse EngineeringUsing the Metasploit command-line interface; Getting started with msfcli; Using invocation modes with msfcli; Bash hacks and msfcli; Preparing payloads with Metasploit; Creating and deploying a payload; Disassembling binaries; Disassembling with Objdump; A note about the reverse engineering assembler code; Debugging binaries for dynamic analysis; Getting started with GDB; Setting execution breakpoints and watch points; Inspecting registers, memory values, and runtime information; Summary; Further reading
|
505 |
8 |
|
|a Chapter 5: Network Exploitation and MonitoringMAC and ARP abuse; Spoofing MAC addresses; Abusing address resolution; Man-in-the-middle attacks; Ettercap DNS spoofing; Interrogating servers; SNMP interrogation; SMTP server interrogation; Brute-forcing authentication; Using Medusa; Traffic filtering with TCPDump; Getting started with TCPDump; Using the TCPDump packet filter; Assessing SSL implementation security; Using SSLyze; Bash hacks and SSLyze; Automated web application security assessment; Scanning with SkipFish; Scanning with Arachni; Summary; Further reading; Index
|
520 |
|
|
|a An easy-to-understand, step-by-step practical guide that shows you how to use the Linux Bash terminal tools to solve information security problems. If you are a penetration tester, system administrator, or developer who would like an enriching and practical introduction to the Bash shell and Kali Linux command-line-based tools, this is the book for you.
|
546 |
|
|
|a English.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
630 |
0 |
0 |
|a Kali Linux.
|
630 |
0 |
0 |
|a UNIX Shells.
|
630 |
0 |
7 |
|a Kali Linux.
|2 fast
|0 (OCoLC)fst01914587
|
630 |
0 |
7 |
|a UNIX Shells.
|2 fast
|0 (OCoLC)fst01371348
|
650 |
|
0 |
|a Penetration testing (Computer security)
|
650 |
|
0 |
|a User interfaces (Computer systems)
|
650 |
|
6 |
|a Tests d'intrusion.
|
650 |
|
6 |
|a Interfaces utilisateurs (Informatique)
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x Online Safety & Privacy.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x Networking.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Langages de programmation.
|2 eclas
|
650 |
|
7 |
|a Programmation informatique.
|2 eclas
|
650 |
|
7 |
|a Informatique.
|2 eclas
|
650 |
|
7 |
|a Sécurité informatique.
|2 eclas
|
650 |
|
7 |
|a Penetration testing (Computer security)
|2 fast
|0 (OCoLC)fst01789566
|
650 |
|
7 |
|a User interfaces (Computer systems)
|2 fast
|0 (OCoLC)fst01163191
|
776 |
0 |
8 |
|i Print version:
|a Makan, Keith.
|t Penetration testing with the Bash shell : make the most of the Bash shell and Kali Linux's command-line-based security assessment tools.
|d Birmingham, England : Packt Publishing Ltd, ©2014
|h iii, 130 pages
|k Community experience distilled.
|z 9781849695107
|
830 |
|
0 |
|a Community experience distilled.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781849695107/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH26851187
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10875448
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 783562
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 11830274
|
994 |
|
|
|a 92
|b IZTAP
|