eBooks-it.org Logo
eBooks-IT.org Inner Image

Penetration Testing with the Bash shell

Penetration Testing with the Bash shell Image

Book Details:

Publisher:Packt Publishing
Series: Packt
Author:Keith Makan
Edition:1
ISBN-10:1849695105
ISBN-13:9781849695107
Pages:150
Published:May 26 2014
Posted:Nov 19 2014
Language:English
Book format:PDF
Book size:3.39 MB

Book Description:

Make the most of the Bash shell and Kali Linux's command-line-based security assessment tools Overview Utilize the command line to create, run, and execute tests Learn useful command line based information processing utilities and unlock the problem solving power of a Linux terminal Practical demonstrations using in-depth explanations and screenshots to help you use the Linux Bash terminal to tackle a collection of common security-related problems. In Detail This book teaches you to take your problem solving capabilities to the next level with the Bash shell, to assess network and application level security by leveraging the power of the command-line tools available with Kali Linux. The book begins by introducing some of the fundamental bash scripting and information processing tools. Building on this, the next few chapters focus on detailing ways to customize your Bash shell using functionalities such as tab completion and rich text formatting. After the fundamental customization techniques and general purpose tools have been discussed, the book breaks into topics such as the command-line-based security tools in the Kali Linux operating system. The general approach in discussing these tools is to involve general purpose tools discussed in previous chapters to integrate security assessment tools. This is a one stop solution to learn Bash and solve information security problems. What you will learn from this book Perform network enumeration techniques with Dig, whois, dnsenum, dnsmap, and others Learn how to fuzz and reverse engineer using the Kali Linux command line tools Exploit common web application vulnerabilities using skipfish, arcachi, and sqlmap Accomplish man-in-the-middle attacks straight from your command line Assess SSL security using sslyze and openssl Carry out network traffic analysis using tcpdump Approach An easy-to-understand, step-by-step practical guide that shows you how to use the Linux Bash terminal tools to solve information security problems. Who this book is written for If you are a penetration tester, system administrator, or developer who would like an enriching and practical introduction to the Bash shell and Kali Linux command-line-based tools, this is the book for you.

Download Link:

Related Books:

Learning the bash Shell

Learning the bash Shell Image
2nd Edition
The first thing users of the Linux operating system come face to face with is the shell. "Shell" is the UNIX term for a user interface to the system -- something that lets you communicate with the computer via the keyboard and display. Bash, the Free Software Foundation's "Bourne Again Shell," is the default shell for Linux, the popular free UNIX-like operating system. It's also a replacement for the standard UNIX Bourne shell, which serves both as a user interface and as a programming language. Like the FSF's other tools, bash is more than a mere replacement: it extends the Bourne shell in many ways. Features include command line e...

Web Penetration Testing with Kali Linux

Web Penetration Testing with Kali Linux Image
A practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocols with Kali Linux Overview Learn key reconnaissance concepts needed as a penetration tester Attack and exploit key features, authentication, and sessions on web applications Learn how to protect systems, write reports, and sell web penetration testing services In Detail Kali Linux is built for professional penetration testing and security auditing. It is the next-generation of BackTrack, the most popular open-source penetration toolkit in the world. Readers will learn how to think like real attackers, exploit systems, and expose vulnerabilities. Even though web applications are developed in a very secure environment and have an ...

Penetration Testing with BackBox

Penetration Testing with BackBox Image
An introductory guide to performing crucial penetration testing operations using Backbox Overview Experience the real world of penetration testing with Backbox Linux using live, practical examples Gain an insight into auditing and penetration testing processes by reading though live sessions Learn how to carry out your own testing using the latest techniques and methodologies In Detail BackBox is an amazing Linux security distribution designed to keep in mind the needs of security and system administration specialists. It has been developed to perform penetration tests and security assessments. Designed to be fast and easy to use while providing a minimal yet complete desktop environment, Backbox comes with its own software repositories and is cont...



2007 - 2021 © eBooks-IT.org