Chapter 1: Getting to Know Bash
Getting help from the man pages
Navigating and searching the filesystem
Using I/O redirection
Using pipes
Getting to know grep
Summary
Further reading
Chapter 2: Customizing Your Shell
Formatting the terminal output
The prompt string
Aliases
Customizing the command history
Customizing tab completion
Summary
Further reading
Chapter 3: Network Reconnaissance
Interrogating the Whois servers
Interrogating the DNS servers
Enumerating targets on the local network
Summary
Further reading
Chapter 4: Exploitation and Reverse Engineering
Using the Metasploit command-line interface
Preparing payloads with Metasploit
Creating and deploying a payload
Disassembling binaries
Debugging binaries for dynamic analysis
Summary
Further reading
Chapter 5: Network Exploitation and Monitoring
MAC and ARP abuse
Man-in-the-middle attacks
Interrogating servers
Brute-forcing authentication
Assessing SSL implementation security
Automated web application security assessment
Summary
Further reading
Index
102. Penetration Testing with the Bash shell
Author:
Myanmar Ebook Store
Genre:
»
Hacking
Rating
Posted by Myanmar Ebook Store
Posted on
