Penetration Testing with the Bash Shell

An easy-to-understand, step-by-step practical guide that shows you how to use the Linux Bash terminal tools to solve information security problems. If you are a penetration tester, system administrator, or developer who would like an enriching and practical introduction to the Bash shell and Kali Li...

Full description

Saved in:
Bibliographic Details
Main Author: Makan, Keith
Format: eBook
Language:English
Published: Birmingham Packt Publishing, Limited 2014
Packt Publishing
Edition:1
Subjects:
ISBN:1849695105, 9781849695107
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Table of Contents:
  • Creating and deploying a payload -- Disassembling binaries -- Disassembling with Objdump -- A note about the reverse engineering assembler code -- Debugging binaries for dynamic analysis -- Getting started with GDB -- Setting execution breakpoints and watch points -- Inspecting registers, memory values, and runtime information -- Summary -- Further reading -- 5. Network Exploitation and Monitoring -- MAC and ARP abuse -- Spoofing MAC addresses -- Abusing address resolution -- Man-in-the-middle attacks -- Ettercap DNS spoofing -- Interrogating servers -- SNMP interrogation -- SMTP server interrogation -- Brute-forcing authentication -- Using Medusa -- Traffic filtering with TCPDump -- Getting started with TCPDump -- Using the TCPDump packet filter -- Assessing SSL implementation security -- Using SSLyze -- Bash hacks and SSLyze -- Automated web application security assessment -- Scanning with SkipFish -- Scanning with Arachni -- Summary -- Further reading -- Index
  • Intro -- Penetration Testing with the Bash shell -- Table of Contents -- Penetration Testing with the Bash shell -- Credits -- Disclaimer -- About the Author -- About the Reviewers -- www.PacktPub.com -- Support files, eBooks, discount offers, and more -- Why subscribe? -- Free access for Packt account holders -- Preface -- What this book covers -- What you need for this book -- Who this book is for -- Conventions -- Reader feedback -- Customer support -- Downloading the example code -- Errata -- Piracy -- Questions -- 1. Getting to Know Bash -- Getting help from the man pages -- Navigating and searching the filesystem -- Navigating directories -- Listing directory contents -- Searching the filesystem -- Directory traversal options -- File testing options -- File action options -- Using I/O redirection -- Redirecting output -- Redirecting input -- Using pipes -- Getting to know grep -- Regular expression language - a crash course -- Regular expression matcher selection options -- Regular expression matching control options -- Output control options -- File selection options -- Summary -- Further reading -- 2. Customizing Your Shell -- Formatting the terminal output -- The prompt string -- Prompt string customizations -- Aliases -- Customizing the command history -- Protecting sensitive information from leakage -- Customizing tab completion -- Summary -- Further reading -- 3. Network Reconnaissance -- Interrogating the Whois servers -- Interrogating the DNS servers -- Using Dig -- Using dnsmap -- Enumerating targets on the local network -- Host discovery with Arping -- Target enumeration with Nmap -- Summary -- Further reading -- 4. Exploitation and Reverse Engineering -- Using the Metasploit command-line interface -- Getting started with msfcli -- Using invocation modes with msfcli -- Bash hacks and msfcli -- Preparing payloads with Metasploit