Cargando…

Cybersecurity Ops with bash : attack, defend, and analyze from the command line /

If you hope to outmaneuver threat actors, speed and efficiency need to be key components of your cybersecurity operations. Mastery of the standard command-line interface (CLI) is an invaluable skill in times of crisis because no other software application can match the CLI's availability, flexi...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Troncone, Paul (Autor), Albing, Carl (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Sebastopol, CA : O'Reilly Media, 2019.
Edición:First edition.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Part 1. Foundations. Command-line primer ; Bash primer ; Regular expressions primer ; Principles of defense and offense
  • Part 2. Defensive security operations with bash. Data collection ; Data processing ; Data analysis ; Real-time log monitoring ; Tool: Network monitor ; Tool: Filesystem monitor ; Malware analysis ; Formatting and reporting
  • Part 3. Penetration testing with bash. Reconnaissance ; Script obfuscation ; Tool: Command-line fuzzer ; Establishing a foothold
  • Part 4. Security administration with bash. Users, groups, and permissions ; Writing log entries ; Tool: System availability monitor ; Tool: Software inventory ; Tool: Validating configuration ; Tool: Account auditing ; Conclusion.