Penetration Testing with the Bash Shell
An easy-to-understand, step-by-step practical guide that shows you how to use the Linux Bash terminal tools to solve information security problems. If you are a penetration tester, system administrator, or developer who would like an enriching and practical introduction to the Bash shell and Kali Li...
Saved in:
| Main Author: | |
|---|---|
| Format: | eBook |
| Language: | English |
| Published: |
Birmingham
Packt Publishing, Limited
2014
Packt Publishing |
| Edition: | 1 |
| Subjects: | |
| ISBN: | 1849695105, 9781849695107 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Table of Contents:
- Creating and deploying a payload -- Disassembling binaries -- Disassembling with Objdump -- A note about the reverse engineering assembler code -- Debugging binaries for dynamic analysis -- Getting started with GDB -- Setting execution breakpoints and watch points -- Inspecting registers, memory values, and runtime information -- Summary -- Further reading -- 5. Network Exploitation and Monitoring -- MAC and ARP abuse -- Spoofing MAC addresses -- Abusing address resolution -- Man-in-the-middle attacks -- Ettercap DNS spoofing -- Interrogating servers -- SNMP interrogation -- SMTP server interrogation -- Brute-forcing authentication -- Using Medusa -- Traffic filtering with TCPDump -- Getting started with TCPDump -- Using the TCPDump packet filter -- Assessing SSL implementation security -- Using SSLyze -- Bash hacks and SSLyze -- Automated web application security assessment -- Scanning with SkipFish -- Scanning with Arachni -- Summary -- Further reading -- Index
- Intro -- Penetration Testing with the Bash shell -- Table of Contents -- Penetration Testing with the Bash shell -- Credits -- Disclaimer -- About the Author -- About the Reviewers -- www.PacktPub.com -- Support files, eBooks, discount offers, and more -- Why subscribe? -- Free access for Packt account holders -- Preface -- What this book covers -- What you need for this book -- Who this book is for -- Conventions -- Reader feedback -- Customer support -- Downloading the example code -- Errata -- Piracy -- Questions -- 1. Getting to Know Bash -- Getting help from the man pages -- Navigating and searching the filesystem -- Navigating directories -- Listing directory contents -- Searching the filesystem -- Directory traversal options -- File testing options -- File action options -- Using I/O redirection -- Redirecting output -- Redirecting input -- Using pipes -- Getting to know grep -- Regular expression language - a crash course -- Regular expression matcher selection options -- Regular expression matching control options -- Output control options -- File selection options -- Summary -- Further reading -- 2. Customizing Your Shell -- Formatting the terminal output -- The prompt string -- Prompt string customizations -- Aliases -- Customizing the command history -- Protecting sensitive information from leakage -- Customizing tab completion -- Summary -- Further reading -- 3. Network Reconnaissance -- Interrogating the Whois servers -- Interrogating the DNS servers -- Using Dig -- Using dnsmap -- Enumerating targets on the local network -- Host discovery with Arping -- Target enumeration with Nmap -- Summary -- Further reading -- 4. Exploitation and Reverse Engineering -- Using the Metasploit command-line interface -- Getting started with msfcli -- Using invocation modes with msfcli -- Bash hacks and msfcli -- Preparing payloads with Metasploit

