Linux Shell Scripting for Hackers. Automate and scale your hacking process with bash scripting - Helion

Tytuł oryginału: Linux Shell Scripting for Hackers. Automate and scale your hacking process with bash scripting
ISBN: 9781835465585
Format: ebook
Księgarnia: Helion
Cena książki: 139,00 zł
Książka będzie dostępna od października 2024
Mastering bash scripting is a powerful skill that separates professional hackers from the rest. This comprehensive guide explores bash scripting in depth, equipping you with the knowledge and tools you need to automate complex tasks, streamline workflows, and craft custom utilities.
The book takes you on a journey through advanced scripting techniques, while helping you master the command line and use practical examples that showcase real-world applications. From automating reconnaissance processes to creating custom exploitation tools, this book provides you with the skills to tackle even the most daunting challenges. You’ll discover how to utilize bash, awk, sed, and regular expressions to manipulate data, parse logs, and extract valuable information. A dedicated section also focuses on network scripting, helping you craft scripts that interact with remote systems, scan, and gather information.
By the end of this bash scripting book, you’ll be able to apply your newfound knowledge to tackle realistic scenarios, honing your skills and preparing for the front lines of cybersecurity.
Zobacz także:
- Biologika Sukcesji Pokoleniowej. Sezon 3. Konflikty na terytorium 117,27 zł, (12,90 zł -89%)
- Windows Media Center. Domowe centrum rozrywki 66,67 zł, (8,00 zł -88%)
- Podręcznik startupu. Budowa wielkiej firmy krok po kroku 92,14 zł, (12,90 zł -86%)
- Ruby on Rails. Ćwiczenia 18,75 zł, (3,00 zł -84%)
- Prawa ludzkiej natury 75,88 zł, (12,90 zł -83%)
Spis treści
Linux Shell Scripting for Hackers. Automate and scale your hacking process with bash scripting eBook -- spis treści
- 1. Why Bash Scripting for Hackers
- 2. Hacking Lab Setup with Kali Linux
- 3. Input, Output, and File Manipulation
- 4. Reconnaissance and Scanning with Nmap
- 5. Automating Web Application Attacks
- 6. Password Cracking Technique
- 7. Delivering Payloads and Exploitation
- 8. Privilege Escalation and Post-Exploitation Actions
- 9. Wi-Fi Hacking with Bash and Aircrack-ng
- 10. Linux system hardening shell scripting
- 11. Automated Report Generation and Visualization
- 12. End-to-End Penetration Testing Projects