Cybersecurity Ops with bash : attack, defend, and analyze from the command line /
If you hope to outmaneuver threat actors, speed and efficiency need to be key components of your cybersecurity operations. Mastery of the standard command-line interface (CLI) is an invaluable skill in times of crisis because no other software application can match the CLI's availability, flexi...
Call Number: | Libro Electrónico |
---|---|
Main Authors: | , |
Format: | Electronic eBook |
Language: | Inglés |
Published: |
Sebastopol, CA :
O'Reilly Media,
2019.
|
Edition: | First edition. |
Subjects: | |
Online Access: | Texto completo (Requiere registro previo con correo institucional) |
Table of Contents:
- Part 1. Foundations. Command-line primer ; Bash primer ; Regular expressions primer ; Principles of defense and offense
- Part 2. Defensive security operations with bash. Data collection ; Data processing ; Data analysis ; Real-time log monitoring ; Tool: Network monitor ; Tool: Filesystem monitor ; Malware analysis ; Formatting and reporting
- Part 3. Penetration testing with bash. Reconnaissance ; Script obfuscation ; Tool: Command-line fuzzer ; Establishing a foothold
- Part 4. Security administration with bash. Users, groups, and permissions ; Writing log entries ; Tool: System availability monitor ; Tool: Software inventory ; Tool: Validating configuration ; Tool: Account auditing ; Conclusion.