Penetration Testing with the Bash shell

Book PDF Download

Table of Contents

Credits

Disclaimer

About the Reviewers

www.PacktPub.com

Preface

Chapter 1: Getting to Know Bash

Navigating and searching the filesystem

Using I/O redirection

Using pipes

Getting to know grep

Summary

Further reading

Chapter 2: Customizing Your Shell

Formatting the terminal output

The prompt string

Aliases

Customizing the command history

Customizing tab completion

Summary

Further reading

Chapter 3: Network Reconnaissance

Interrogating the Whois servers

Interrogating the DNS servers

Enumerating targets on the local network

Summary

Further reading

Chapter 4: Exploitation and Reverse Engineering

Using the Metasploit command-line interface

Preparing payloads with Metasploit

Creating and deploying a payload

Disassembling binaries

Debugging binaries for dynamic analysis

Summary

Further reading

Chapter 5: Network Exploitation rand Monitoring

MAC and ARP abuse

Man-in-the-middle attacks

Interrogating servers

Brute-forcing authentication

Traffic filtering with TCPDump

Assessing SSL implementation security

Automated web application security assessment

Summary

Further reading

Index

Penetration Testing
with the Bash shell

Make the most of the Bash shell and Kali Linux's
command-line-based security assessment tools

PACKT

Related