Chargement en cours…

Cybersecurity Ops with bash : attack, defend, and analyze from the command line /

If you hope to outmaneuver threat actors, speed and efficiency need to be key components of your cybersecurity operations. Mastery of the standard command-line interface (CLI) is an invaluable skill in times of crisis because no other software application can match the CLI's availability, flexi...

Description complète

Détails bibliographiques
Cote:Libro Electrónico
Auteurs principaux: Troncone, Paul (Auteur), Albing, Carl (Auteur)
Format: Électronique eBook
Langue:Inglés
Publié: Sebastopol, CA : O'Reilly Media, 2019.
Édition:First edition.
Sujets:
Accès en ligne:Texto completo (Requiere registro previo con correo institucional)
Table des matières:
  • Part 1. Foundations. Command-line primer ; Bash primer ; Regular expressions primer ; Principles of defense and offense
  • Part 2. Defensive security operations with bash. Data collection ; Data processing ; Data analysis ; Real-time log monitoring ; Tool: Network monitor ; Tool: Filesystem monitor ; Malware analysis ; Formatting and reporting
  • Part 3. Penetration testing with bash. Reconnaissance ; Script obfuscation ; Tool: Command-line fuzzer ; Establishing a foothold
  • Part 4. Security administration with bash. Users, groups, and permissions ; Writing log entries ; Tool: System availability monitor ; Tool: Software inventory ; Tool: Validating configuration ; Tool: Account auditing ; Conclusion.