reklama - zainteresowany?

Cybersecurity Ops with bash. Attack, Defend, and Analyze from the Command Line - Helion

Cybersecurity Ops with bash. Attack, Defend, and Analyze from the Command Line
ebook
Autor: Paul Troncone, Carl Albing Ph. D.
ISBN: 978-14-920-4126-9
stron: 306, Format: ebook
Data wydania: 2019-04-02
Księgarnia: Helion

Cena książki: 194,65 zł (poprzednio: 226,34 zł)
Oszczędzasz: 14% (-31,69 zł)

Dodaj do koszyka Cybersecurity Ops with bash. Attack, Defend, and Analyze from the Command Line

Tagi: Bezpieczeństwo systemów

If you hope to outmaneuver threat actors, speed and efficiency need to be key components of your cybersecurity operations. Mastery of the standard command-line interface (CLI) is an invaluable skill in times of crisis because no other software application can match the CLI’s availability, flexibility, and agility. This practical guide shows you how to use the CLI with the bash shell to perform tasks such as data collection and analysis, intrusion detection, reverse engineering, and administration.

Authors Paul Troncone, founder of Digadel Corporation, and Carl Albing, coauthor of bash Cookbook (O’Reilly), provide insight into command-line tools and techniques to help defensive operators collect data, analyze logs, and monitor networks. Penetration testers will learn how to leverage the enormous amount of functionality built into nearly every version of Linux to enable offensive operations.

In four parts, security practitioners, administrators, and students will examine:

  • Foundations: Principles of defense and offense, command-line and bash basics, and regular expressions
  • Defensive security operations: Data collection and analysis, real-time log monitoring, and malware analysis
  • Penetration testing: Script obfuscation and tools for command-line fuzzing and remote access
  • Security administration: Users, groups, and permissions; device and software inventory

Dodaj do koszyka Cybersecurity Ops with bash. Attack, Defend, and Analyze from the Command Line

Spis treści

Cybersecurity Ops with bash. Attack, Defend, and Analyze from the Command Line eBook -- spis treści

  • Preface
    • Who This Book Is For
    • Bash or bash
    • Script Robustness
    • Workshops
    • Conventions Used in This Book
    • Using Code Examples
    • OReilly Online Learning
    • How to Contact Us
    • Acknowledgments
    • Disclaimer
  • I. Foundations
  • 1. Command-Line Primer
    • The Command Line Defined
    • Why bash?
    • Command-Line Illustrations
    • Running Linux and bash on Windows
      • Git Bash
      • Cygwin
      • Windows Subsystem for Linux
      • Windows Command Prompt and PowerShell
    • Command-Line Basics
      • Commands, Arguments, Built-ins, and Keywords
      • Standard Input/Output/Error
      • Redirection and Piping
      • Running Commands in the Background
      • From Command Line to Script
    • Summary
    • Workshop
  • 2. Bash Primer
    • Output
    • Variables
      • Positional Parameters
    • Input
    • Conditionals
    • Looping
    • Functions
      • Function Arguments
      • Returning Values
    • Pattern Matching in bash
    • Writing Your First ScriptDetecting Operating System Type
    • Summary
    • Workshop
  • 3. Regular Expressions Primer
    • Commands in Use
      • grep
        • Common command options
        • Command example
      • grep and egrep
    • Regular Expression Metacharacters
      • The . Metacharacter
      • The ? Metacharacter
      • The * Metacharacter
      • The + Metacharacter
      • Grouping
      • Brackets and Character Classes
      • Back References
      • Quantifiers
      • Anchors and Word Boundaries
    • Summary
    • Workshop
  • 4. Principles of Defense and Offense
    • Cybersecurity
      • Confidentiality
      • Integrity
      • Availability
      • Nonrepudiation
      • Authentication
    • The Attack Life Cycle
      • Reconnaissance
      • Initial Exploitation
      • Establish Foothold
      • Escalate Privileges
      • Internal Reconnaissance
      • Lateral Movement
      • Maintain Presence
      • Complete Mission
    • Summary
  • II. Defensive Security Operations with bash
  • 5. Data Collection
    • Commands in Use
      • cut
        • Common command options
        • Command example
      • file
        • Common command options
        • Command example
      • head
        • Common command options
      • reg
        • Common command parameters
        • Command example
      • wevtutil
        • Common command parameters
        • Common command options
        • Command example
    • Gathering System Information
      • Executing a Command Remotely Using SSH
      • Gathering Linux Logfiles
      • Gathering Windows Logfiles
      • Gathering System Information
      • Gathering the Windows Registry
    • Searching the Filesystem
      • Searching by Filename
      • Searching for Hidden Files
      • Searching by File Size
      • Searching by Time
      • Searching for Content
      • Searching by File Type
      • Searching by Message Digest Value
    • Transferring Data
    • Summary
    • Workshop
  • 6. Data Processing
    • Commands in Use
      • awk
        • Common command options
        • Command example
      • join
        • Common command options
        • Command example
      • sed
        • Common command options
        • Command example
      • tail
        • Common command options
        • Command example
      • tr
        • Common command options
        • Command example
    • Processing Delimited Files
      • Iterating Through Delimited Data
      • Processing by Character Position
    • Processing XML
    • Processing JSON
    • Aggregating Data
    • Summary
    • Workshop
  • 7. Data Analysis
    • Commands in Use
      • sort
        • Common command options
        • Command example
      • uniq
        • Common command options
    • Web Server Access Log Familiarization
    • Sorting and Arranging Data
    • Counting Occurrences in Data
    • Totaling Numbers in Data
    • Displaying Data in a Histogram
    • Finding Uniqueness in Data
    • Identifying Anomalies in Data
    • Summary
    • Workshop
  • 8. Real-Time Log Monitoring
    • Monitoring Text Logs
      • Log-Based Intrusion Detection
    • Monitoring Windows Logs
    • Generating a Real-Time Histogram
    • Summary
    • Workshop
  • 9. Tool: Network Monitor
    • Commands in Use
      • crontab
        • Common command options
      • schtasks
        • Common command options
    • Step 1: Creating a Port Scanner
    • Step 2: Comparing to Previous Output
    • Step 3: Automation and Notification
      • Scheduling a Task in Linux
      • Scheduling a Task in Windows
    • Summary
    • Workshop
  • 10. Tool: Filesystem Monitor
    • Commands in Use
      • sdiff
        • Common command options
        • Command example
    • Step 1: Baselining the Filesystem
    • Step 2: Detecting Changes to the Baseline
    • Step 3: Automation and Notification
    • Summary
    • Workshop
  • 11. Malware Analysis
    • Commands in Use
      • curl
        • Common command options
        • Command example
      • vi
        • Command example
      • xxd
        • Common command options
        • Command example
    • Reverse Engineering
      • Hexadecimal, Decimal, Binary, and ASCII Conversions
      • Analyzing with xxd
        • Hex editor
    • Extracting Strings
    • Interfacing with VirusTotal
      • Searching the Database by Hash Value
      • Scanning a File
      • Scanning URLs, Domains, and IP Addresses
    • Summary
    • Workshop
  • 12. Formatting and Reporting
    • Commands in Use
      • tput
        • Common command parameters
    • Formatting for Display and Print with HTML
    • Creating a Dashboard
    • Summary
    • Workshop
  • III. Penetration Testing with bash
  • 13. Reconnaissance
    • Commands in Use
      • ftp
        • Common command options
        • Command example
    • Crawling Websites
    • Automated Banner Grabbing
    • Summary
    • Workshop
  • 14. Script Obfuscation
    • Commands in Use
      • base64
        • Common command options
        • Command example
      • eval
        • Command example
    • Obfuscating Syntax
    • Obfuscating Logic
    • Encrypting
      • Cryptography Primer
        • Encryption
        • Decryption
        • Cryptographic key
      • Encrypting the Script
      • Creating the Wrapper
      • Creating Your Own Crypto
    • Summary
    • Workshop
  • 15. Tool: Command-Line Fuzzer
    • Implementation
    • Summary
    • Workshop
  • 16. Establishing a Foothold
    • Commands in Use
      • nc
        • Common command options
        • Command example
    • Single-Line Backdoors
      • Reverse SSH
      • Bash Backdoor
    • Custom Remote-Access Tool
      • Implementation
    • Summary
    • Workshop
  • IV. Security Administration with bash
  • 17. Users, Groups, and Permissions
    • Commands in Use
      • chmod
        • Common command options
      • chown
        • Common command options
      • getfacl
        • Common command options
      • groupadd
        • Common command options
      • setfacl
        • Common command options
      • useradd
        • Common command options
      • usermod
        • Common command options
      • icacls
        • Common command options
      • net
        • Common command options
    • Users and Groups
      • Creating Linux Users and Groups
      • Creating Windows Users and Groups
    • File Permissions and Access Control Lists
      • Linux File Permissions
        • Linux access control lists
      • Windows File Permissions
    • Making Bulk Changes
    • Summary
    • Workshop
  • 18. Writing Log Entries
    • Commands in Use
      • eventcreate
        • Common command options
      • logger
        • Common command options
    • Writing Windows Logs
    • Writing Linux Logs
    • Summary
    • Workshop
  • 19. Tool: System Availability Monitor
    • Commands in Use
      • ping
        • Common command options
        • Command example
    • Implementation
    • Summary
    • Workshop
  • 20. Tool: Software Inventory
    • Commands in Use
      • apt
        • Common command options
        • Command example
      • dpkg
        • Common command options
        • Command example
      • wmic
        • Common command options
        • Command example
      • yum
        • Common command options
        • Command example
    • Implementation
    • Identifying Other Software
    • Summary
    • Workshop
  • 21. Tool: Validating Configuration
    • Implementation
    • Summary
    • Workshop
  • 22. Tool: Account Auditing
    • Have I Been Pwned?
    • Checking for a Breached Password
    • Checking for a Breached Email Address
      • Batch-Processing Emails
    • Summary
    • Workshop
  • 23. Conclusion
  • Index

Dodaj do koszyka Cybersecurity Ops with bash. Attack, Defend, and Analyze from the Command Line

Code, Publish & WebDesing by CATALIST.com.pl



(c) 2005-2024 CATALIST agencja interaktywna, znaki firmowe należą do wydawnictwa Helion S.A.