• 首页
  • 玄幻
  • 武侠
  • 历史
  • 科幻
  • 轻小说

Penetration Testing with the Bash shell

Keith Makan

更新时间:2021-07-16 11:52:11

最新章节:Index
完结共56章
倒序

coverpage

Penetration Testing with the Bash shell

Credits

Disclaimer

About the Author

About the Reviewers

www.PacktPub.com

Support files eBooks discount offers and more

Preface

What this book covers

What you need for this book

Who this book is for

Conventions

Reader feedback

Customer support

Chapter 1. Getting to Know Bash

Getting help from the man pages

Navigating and searching the filesystem

Using I/O redirection

Using pipes

Getting to know grep

Summary

Further reading

Chapter 2. Customizing Your Shell

Formatting the terminal output

The prompt string

Aliases

Customizing the command history

Customizing tab completion

Summary

Further reading

Chapter 3. Network Reconnaissance

Interrogating the Whois servers

Interrogating the DNS servers

Enumerating targets on the local network

Summary

Further reading

Chapter 4. Exploitation and Reverse Engineering

Using the Metasploit command-line interface

Preparing payloads with Metasploit

Creating and deploying a payload

Disassembling binaries

Debugging binaries for dynamic analysis

Summary

Further reading

Chapter 5. Network Exploitation and Monitoring

MAC and ARP abuse

Man-in-the-middle attacks

Interrogating servers

Brute-forcing authentication

Traffic filtering with TCPDump

Assessing SSL implementation security

Automated web application security assessment

Summary

Further reading

Index

更新时间:2021-07-16 11:52:11