Cybersecurity Ops with bash : attack, defend, and analyze from the command line /
If you hope to outmaneuver threat actors, speed and efficiency need to be key components of your cybersecurity operations. Mastery of the standard command-line interface (CLI) is an invaluable skill in times of crisis because no other software application can match the CLI's availability, flexi...
Clasificación: | Libro Electrónico |
---|---|
Autores principales: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Sebastopol, CA :
O'Reilly Media,
2019.
|
Edición: | First edition. |
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Part 1. Foundations. Command-line primer ; Bash primer ; Regular expressions primer ; Principles of defense and offense
- Part 2. Defensive security operations with bash. Data collection ; Data processing ; Data analysis ; Real-time log monitoring ; Tool: Network monitor ; Tool: Filesystem monitor ; Malware analysis ; Formatting and reporting
- Part 3. Penetration testing with bash. Reconnaissance ; Script obfuscation ; Tool: Command-line fuzzer ; Establishing a foothold
- Part 4. Security administration with bash. Users, groups, and permissions ; Writing log entries ; Tool: System availability monitor ; Tool: Software inventory ; Tool: Validating configuration ; Tool: Account auditing ; Conclusion.