Penetration Testing with the Bash shell
Keith Makan
- 出版商: Packt Publishing
- 出版日期: 2014-05-18
- 售價: $1,170
- 貴賓價: 9.5 折 $1,112
- 語言: 英文
- 頁數: 150
- 裝訂: Paperback
- ISBN: 1849695105
- ISBN-13: 9781849695107
-
相關分類:
Command Line、Penetration-test
海外代購書籍(需單獨結帳)
買這商品的人也買了...
-
$550$495 -
$1,250$1,188 -
$690$538 -
$480$432 -
$267Linux 網絡編程(第2版)
-
$834$792 -
$199Python 網絡編程 (Linux)
-
$390$371 -
$1,340$1,273 -
$580$458 -
$203Linux 網絡編程
-
$352Python 網絡編程從入門到精通
-
$714$678 -
$403Scratch 項目式編程實戰:打造超酷大型遊戲
-
$354$336 -
$600$468 -
$720$569 -
$474$450 -
$820$648 -
$474$450 -
$800$600
相關主題
商品描述
Make the most of the Bash shell and Kali Linux's command-line-based security assessment tools
Overview
- Utilize the command line to create, run, and execute tests
- Learn useful command line based information processing utilities and unlock the problem solving power of a Linux terminal
- Practical demonstrations using in-depth explanations and screenshots to help you use the Linux Bash terminal to tackle a collection of common security-related problems.
In Detail
This book teaches you to take your problem solving capabilities to the next level with the Bash shell, to assess network and application level security by leveraging the power of the command-line tools available with Kali Linux.
The book begins by introducing some of the fundamental bash scripting and information processing tools. Building on this, the next few chapters focus on detailing ways to customize your Bash shell using functionalities such as tab completion and rich text formatting. After the fundamental customization techniques and general purpose tools have been discussed, the book breaks into topics such as the command-line-based security tools in the Kali Linux operating system. The general approach in discussing these tools is to involve general purpose tools discussed in previous chapters to integrate security assessment tools. This is a one stop solution to learn Bash and solve information security problems.
What you will learn from this book
- Perform network enumeration techniques with Dig, whois, dnsenum, dnsmap, and others
- Learn how to fuzz and reverse engineer using the Kali Linux command line tools
- Exploit common web application vulnerabilities using skipfish, arcachi, and sqlmap
- Accomplish man-in-the-middle attacks straight from your command line
- Assess SSL security using sslyze and openssl
- Carry out network traffic analysis using tcpdump
Approach
An easy-to-understand, step-by-step practical guide that shows you how to use the Linux Bash terminal tools to solve information security problems.
Who this book is written for
If you are a penetration tester, system administrator, or developer who would like an enriching and practical introduction to the Bash shell and Kali Linux command-line-based tools, this is the book for you.
商品描述(中文翻譯)
充分利用Bash shell和Kali Linux的基於命令行的安全評估工具
概述
- 利用命令行創建、運行和執行測試
- 學習有用的基於命令行的信息處理工具,發揮Linux終端的問題解決能力
- 通過實際演示、詳細解釋和截圖,幫助您使用Linux Bash終端解決一系列常見的安全相關問題
詳細內容
本書教您如何通過Bash shell將問題解決能力提升到更高水平,利用Kali Linux提供的命令行工具評估網絡和應用層安全。
本書首先介紹了一些基本的Bash腳本和信息處理工具。在此基礎上,接下來的幾章專注於詳細介紹如何使用功能,例如Tab鍵自動完成和豐富的文本格式化來自定義您的Bash shell。在討論了基本的自定義技術和通用工具之後,本書將進入Kali Linux操作系統中基於命令行的安全工具的主題。在討論這些工具時,一般的方法是將之前章節中討論的通用工具與安全評估工具相結合。這是一個學習Bash和解決信息安全問題的一站式解決方案。
本書將教您以下內容:
- 使用Dig、whois、dnsenum、dnsmap等工具進行網絡枚舉技術
- 學習使用Kali Linux命令行工具進行模糊測試和逆向工程
- 利用skipfish、arcachi和sqlmap等工具利用常見的Web應用程序漏洞
- 直接從命令行執行中間人攻擊
- 使用sslyze和openssl評估SSL安全性
- 使用tcpdump進行網絡流量分析
方法
這是一本易於理解、逐步實用的指南,向您展示如何使用Linux Bash終端工具解決信息安全問題。
本書的讀者對象
如果您是滲透測試人員、系統管理員或開發人員,並且希望對Bash shell和Kali Linux基於命令行的工具有一個豐富而實用的介紹,那麼這本書就是為您而寫的。