04592nam 2200637 450 991078655140332120200520144314.01-84969-511-3(CKB)3710000000117820(EBL)1688642(SSID)ssj0001295100(PQKBManifestationID)11855656(PQKBTitleCode)TC0001295100(PQKBWorkID)11336537(PQKB)10234549(Au-PeEL)EBL1688642(CaPaEBR)ebr10875448(CaONFJC)MIL613591(OCoLC)881035340(CaSebORM)9781849695107(MiAaPQ)EBC1688642(PPN)22804281X(EXLCZ)99371000000011782020140603h20142014 uy 0engur|n|---|||||txtccrPenetration testing with the Bash shell make the most of the Bash shell and Kali Linux's command-line-based security assessment tools /Keith Makan1st editionBirmingham, England :Packt Publishing Ltd,2014.©20141 online resource (151 p.)Community Experience DistilledIncludes index.1-84969-510-5 Cover; Copyright; Credits; Disclaimer; About the Author; About the Reviewers; www.PacktPub.com; Preface; Chapter 1: Getting to Know Bash; Getting help from the man pages; Navigating and searching the filesystem; Navigating directories; Listing directory contents; Searching the filesystem; Directory traversal options; File testing options; File action options; Using I/O redirection; Redirecting output; Redirecting input; Using pipes; Getting to know grep; Regular expression language - a crash course; Regular expression matcher selection options; Regular expression matching control optionsOutput control optionsFile selection options; Summary; Further reading; Chapter 2: Customizing Your Shell; Formatting the terminal output; The prompt string; Prompt string customizations; Aliases; Customizing the command history; Protecting sensitive information from leakage; Customizing tab completion; Summary; Further reading; Chapter 3: Network Reconnaissance; Interrogating the Whois servers; Interrogating the DNS servers; Using Dig; Using dnsmap; Enumerating targets on the local network; Host discovery with Arping; Target enumeration with Nmap; Summary; Further readingChapter 4: Exploitation and Reverse EngineeringUsing the Metasploit command-line interface; Getting started with msfcli; Using invocation modes with msfcli; Bash hacks and msfcli; Preparing payloads with Metasploit; Creating and deploying a payload; Disassembling binaries; Disassembling with Objdump; A note about the reverse engineering assembler code; Debugging binaries for dynamic analysis; Getting started with GDB; Setting execution breakpoints and watch points; Inspecting registers, memory values, and runtime information; Summary; Further readingChapter 5: Network Exploitation and MonitoringMAC and ARP abuse; Spoofing MAC addresses; Abusing address resolution; Man-in-the-middle attacks; Ettercap DNS spoofing; Interrogating servers; SNMP interrogation; SMTP server interrogation; Brute-forcing authentication; Using Medusa; Traffic filtering with TCPDump; Getting started with TCPDump; Using the TCPDump packet filter; Assessing SSL implementation security; Using SSLyze; Bash hacks and SSLyze; Automated web application security assessment; Scanning with SkipFish; Scanning with Arachni; Summary; Further reading; IndexAn easy-to-understand, step-by-step practical guide that shows you how to use the Linux Bash terminal tools to solve information security problems. If you are a penetration tester, system administrator, or developer who would like an enriching and practical introduction to the Bash shell and Kali Linux command-line-based tools, this is the book for you. Community experience distilled.Penetration testing (Computer security)ExaminationsUser interfaces (Computer systems)DesignPenetration testing (Computer security)Examinations.User interfaces (Computer systems)Design.005.8092Makan Keith1492240MiAaPQMiAaPQMiAaPQBOOK9910786551403321Penetration testing with the Bash shell3714613UNINA