LEADER 04592nam 2200637 450 001 9910786551403321 005 20200520144314.0 010 $a1-84969-511-3 035 $a(CKB)3710000000117820 035 $a(EBL)1688642 035 $a(SSID)ssj0001295100 035 $a(PQKBManifestationID)11855656 035 $a(PQKBTitleCode)TC0001295100 035 $a(PQKBWorkID)11336537 035 $a(PQKB)10234549 035 $a(Au-PeEL)EBL1688642 035 $a(CaPaEBR)ebr10875448 035 $a(CaONFJC)MIL613591 035 $a(OCoLC)881035340 035 $a(CaSebORM)9781849695107 035 $a(MiAaPQ)EBC1688642 035 $a(PPN)22804281X 035 $a(EXLCZ)993710000000117820 100 $a20140603h20142014 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aPenetration testing with the Bash shell $emake the most of the Bash shell and Kali Linux's command-line-based security assessment tools /$fKeith Makan 205 $a1st edition 210 1$aBirmingham, England :$cPackt Publishing Ltd,$d2014. 210 4$dİ2014 215 $a1 online resource (151 p.) 225 1 $aCommunity Experience Distilled 300 $aIncludes index. 311 $a1-84969-510-5 327 $aCover; Copyright; Credits; Disclaimer; About the Author; About the Reviewers; www.PacktPub.com; Preface; Chapter 1: Getting to Know Bash; Getting help from the man pages; Navigating and searching the filesystem; Navigating directories; Listing directory contents; Searching the filesystem; Directory traversal options; File testing options; File action options; Using I/O redirection; Redirecting output; Redirecting input; Using pipes; Getting to know grep; Regular expression language - a crash course; Regular expression matcher selection options; Regular expression matching control options 327 $aOutput control optionsFile selection options; Summary; Further reading; Chapter 2: Customizing Your Shell; Formatting the terminal output; The prompt string; Prompt string customizations; Aliases; Customizing the command history; Protecting sensitive information from leakage; Customizing tab completion; Summary; Further reading; Chapter 3: Network Reconnaissance; Interrogating the Whois servers; Interrogating the DNS servers; Using Dig; Using dnsmap; Enumerating targets on the local network; Host discovery with Arping; Target enumeration with Nmap; Summary; Further reading 327 $aChapter 4: Exploitation and Reverse EngineeringUsing the Metasploit command-line interface; Getting started with msfcli; Using invocation modes with msfcli; Bash hacks and msfcli; Preparing payloads with Metasploit; Creating and deploying a payload; Disassembling binaries; Disassembling with Objdump; A note about the reverse engineering assembler code; Debugging binaries for dynamic analysis; Getting started with GDB; Setting execution breakpoints and watch points; Inspecting registers, memory values, and runtime information; Summary; Further reading 327 $aChapter 5: Network Exploitation and MonitoringMAC and ARP abuse; Spoofing MAC addresses; Abusing address resolution; Man-in-the-middle attacks; Ettercap DNS spoofing; Interrogating servers; SNMP interrogation; SMTP server interrogation; Brute-forcing authentication; Using Medusa; Traffic filtering with TCPDump; Getting started with TCPDump; Using the TCPDump packet filter; Assessing SSL implementation security; Using SSLyze; Bash hacks and SSLyze; Automated web application security assessment; Scanning with SkipFish; Scanning with Arachni; Summary; Further reading; Index 330 $aAn easy-to-understand, step-by-step practical guide that shows you how to use the Linux Bash terminal tools to solve information security problems. If you are a penetration tester, system administrator, or developer who would like an enriching and practical introduction to the Bash shell and Kali Linux command-line-based tools, this is the book for you. 410 0$aCommunity experience distilled. 606 $aPenetration testing (Computer security)$xExaminations 606 $aUser interfaces (Computer systems)$xDesign 615 0$aPenetration testing (Computer security)$xExaminations. 615 0$aUser interfaces (Computer systems)$xDesign. 676 $a005.8092 700 $aMakan$b Keith$01492240 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910786551403321 996 $aPenetration testing with the Bash shell$93714613 997 $aUNINA