102. Penetration Testing with the Bash shell

    Author: Myanmar Ebook Store Genre: »
    Rating

    Chapter 1: Getting to Know Bash
    Getting help from the man pages
    Navigating and searching the filesystem
    Using I/O redirection
    Using pipes
    Getting to know grep
    Summary
    Further reading

    Chapter 2: Customizing Your Shell
    Formatting the terminal output
    The prompt string
    Aliases
    Customizing the command history
    Customizing tab completion
    Summary
    Further reading

    Chapter 3: Network Reconnaissance
    Interrogating the Whois servers
    Interrogating the DNS servers
    Enumerating targets on the local network
    Summary
    Further reading

    Chapter 4: Exploitation and Reverse Engineering
    Using the Metasploit command-line interface
    Preparing payloads with Metasploit
    Creating and deploying a payload
    Disassembling binaries
    Debugging binaries for dynamic analysis
    Summary
    Further reading

    Chapter 5: Network Exploitation and Monitoring
    MAC and ARP abuse
    Man-in-the-middle attacks
    Interrogating servers
    Brute-forcing authentication
    Assessing SSL implementation security
    Automated web application security assessment
    Summary
    Further reading

    Index

    Leave a Reply

    Blogger templates

    Blogger news

    Blogroll