Loading…

Cybersecurity Ops with bash : attack, defend, and analyze from the command line /

If you hope to outmaneuver threat actors, speed and efficiency need to be key components of your cybersecurity operations. Mastery of the standard command-line interface (CLI) is an invaluable skill in times of crisis because no other software application can match the CLI's availability, flexi...

Full description

Bibliographic Details
Call Number:Libro Electrónico
Main Authors: Troncone, Paul (Author), Albing, Carl (Author)
Format: Electronic eBook
Language:Inglés
Published: Sebastopol, CA : O'Reilly Media, 2019.
Edition:First edition.
Subjects:
Online Access:Texto completo (Requiere registro previo con correo institucional)
Table of Contents:
  • Part 1. Foundations. Command-line primer ; Bash primer ; Regular expressions primer ; Principles of defense and offense
  • Part 2. Defensive security operations with bash. Data collection ; Data processing ; Data analysis ; Real-time log monitoring ; Tool: Network monitor ; Tool: Filesystem monitor ; Malware analysis ; Formatting and reporting
  • Part 3. Penetration testing with bash. Reconnaissance ; Script obfuscation ; Tool: Command-line fuzzer ; Establishing a foothold
  • Part 4. Security administration with bash. Users, groups, and permissions ; Writing log entries ; Tool: System availability monitor ; Tool: Software inventory ; Tool: Validating configuration ; Tool: Account auditing ; Conclusion.