Penetration Testing with the Bash shell

[desc]Penetration Testing
with the Bash shell

Make the most of the Bash shell and Kali Linux’s
command-line-based security assessment tools

PACKT[/desc][img]72617-Penetration%20Testing%20with%20the%20Bash%20shell.webp[/img][bookmark]{“51″: [3,”Getting started with msfcli”,85],”14″: [4,”Directory traversal options”,34],”71″: [2,”Interrogating servers”,116],”24″: [3,”Regular expression matching control options”,47],”35″: [3,”Protecting sensitive information from leakage”,61],”45″: [3,”Host discovery with Arping”,78],”25″: [3,”Output control options”,48],”40″: [2,”Interrogating the Whois servers”,68],”36″: [2,”Customizing tab completion”,63],”80″: [3,”Using SSLyze”,131],”87″: [1,”Index”,142],”10″: [2,”Navigating and searching the filesystem”,27],”29″: [1,”Chapter 2: Customizing Your Shell”,52],”78″: [3,”Using the TCPDump packet filter”,127],”42″: [3,”Using Dig”,72],”60″: [3,”Getting started with GDB”,102],”41″: [2,”Interrogating the DNS servers”,71],”33″: [2,”Aliases”,59],”6″: [1,”www.PacktPub.com”,9],”0″: [1,”Cover”,1],”13″: [3,”Searching the filesystem”,32],”54″: [2,”Preparing payloads with Metasploit”,91],”84″: [3,”Scanning with Arachni”,138],”20″: [2,”Using pipes”,42],”16″: [4,”File action options”,37],”68″: [3,”Abusing address resolution”,114],”73″: [3,”SMTP server interrogation”,122],”9″: [2,”Getting help from the man pages”,25],”27″: [2,”Summary”,50],”75″: [3,”Using Medusa”,123],”32″: [3,”Prompt string customizations”,58],”76″: [2,”Traffic filtering with TCPDump”,125],”48″: [2,”Further reading”,83],”44″: [2,”Enumerating targets on the local network”,78],”28″: [2,”Further reading”,50],”4″: [1,”About the Author”,6],”77″: [3,”Getting started with TCPDump”,125],”67″: [3,”Spoofing MAC addresses”,113],”56″: [2,”Disassembling binaries”,97],”15″: [4,”File testing options”,34],”5″: [1,”About the Reviewers”,7],”49″: [1,”Chapter 4: Exploitation and Reverse Engineering”,84],”47″: [2,”Summary”,82],”66″: [2,”MAC and ARP abuse”,112],”26″: [3,”File selection options”,48],”79″: [2,”Assessing SSL implementation security”,130],”55″: [2,”Creating and deploying a payload”,94],”38″: [2,”Further reading”,67],”12″: [3,”Listing directory contents”,30],”50″: [2,”Using the Metasploit command-line interface”,84],”82″: [2,”Automated web application security assessment”,135],”46″: [3,”Target enumeration with Nmap”,80],”59″: [2,”Debugging binaries for dynamic analysis”,101],”23″: [3,”Regular expression matcher selection options”,46],”17″: [2,”Using I/O redirection”,39],”22″: [3,”Regular expression language – a crash course”,44],”37″: [2,”Summary”,67],”58″: [3,”A note about the reverse engineering assembler code”,100],”64″: [2,”Further reading”,109],”21″: [2,”Getting to know grep”,43],”65″: [1,”Chapter 5: Network Exploitation rand Monitoring”,112],”86″: [2,”Further reading”,140],”52″: [3,”Using invocation modes with msfcli”,86],”34″: [2,”Customizing the command history”,60],”19″: [3,”Redirecting input”,41],”53″: [3,”Bash hacks and msfcli”,89],”39″: [1,”Chapter 3: Network Reconnaissance”,68],”85″: [2,”Summary”,139],”7″: [1,”Preface”,18],”74″: [2,”Brute-forcing authentication”,123],”3″: [1,”Disclaimer”,5],”69″: [2,”Man-in-the-middle attacks”,115],”72″: [3,”SNMP interrogation”,117],”43″: [3,”Using dnsmap”,76],”31″: [2,”The prompt string”,56],”70″: [3,”Ettercap DNS spoofing”,116],”81″: [3,”Bash hacks and SSLyze”,133],”1″: [1,”Copyright”,3],”62″: [3,”Inspecting registers, memory values, and runtime information”,106],”18″: [3,”Redirecting output”,39],”61″: [3,”Setting execution breakpoints and watch points”,103],”11″: [3,”Navigating directories”,28],”8″: [1,”Chapter 1: Getting to Know Bash”,24],”2″: [1,”Credits”,4],”63″: [2,”Summary”,109],”83″: [3,”Scanning with SkipFish”,136],”57″: [3,”Disassembling with Objdump”,97],”30″: [2,”Formatting the terminal output”,52]
}[/bookmark]

Related