Black Hat Bash

Black Hat Bash
-0 %
Bash Scripting for Hackers and Pentesters
Vorbestellbar | Lieferzeit: Vorbestellbar - Erscheint laut Verlag im/am 01.10.2024. I

Erstverkaufstag: 01.10.2024

Unser bisheriger Preis:ORGPRICE: 60,50 €

Jetzt 60,49 €*

Alle Preise inkl. MwSt. | Versandkostenfrei
Artikel-Nr:
9781718503748
Veröffentl:
2024
Erscheinungsdatum:
01.10.2024
Seiten:
336
Autor:
Nick Aleks
Gewicht:
368 g
Sprache:
Englisch
Beschreibung:

Nick Aleks and Dolev Farhi
Master the art of offensive bash scripting. This highly practical hands-on guide covers chaining commands together, automating tasks, crafting living-off-the-land attacks, and more!Bash is one of the first building blocks that expert penetration testers learn. But every hacker, regardless of experience level, should know their way around a bash shell—its powerful scripting language lets you scale your attacks and write your own tools when others aren’t available. Black Hat Bash will teach you how to harness this essential pentesting skill set through hands-on exercises that use bash scripting to chain commands together, automate critical tasks, craft successful living-off-the-land attacks, and more.Early chapters cover the bash scripting language’s syntax and help you set up a lab environment to test your newfound bash abilities during all stages of the penetration testing process. You’ll soon be automating reconnaissance tasks, performing OS command injection, parsing tool output to extract important information, and maneuvering a restricted network using bash techniques that make your offensive engagements more efficient. This book makes bash easy to learn. And, with its focus on presenting bash in the context of pentesting, you’ll not only learn the language but you’ll also pick up lots of hacking tricks that allow you to use bash right away as your go-to offensive security tool.
AcknowledgmentsIntroductionChapter 1: Bash BasicsChapter 2: Flow Control and Text ProcessingChapter 3: Setting Up a Hacking LabChapter 4: ReconnaissanceChapter 5: Vulnerability Scanning and FuzzingChapter 6: Gaining a Web ShellChapter 7: Reverse ShellsChapter 8: Local Information GatheringChapter 9: Privilege EscalationChapter 10: PersistenceChapter 11: Lateral Movement and Network ProbingChapter 12: Defensive Evasion and ExfiltrationIndex

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.