Linux Shell Scripting for Hackers. Automate and scale your hacking process with bash scripting - Helion
Tytuł oryginału: Linux Shell Scripting for Hackers. Automate and scale your hacking process with bash scripting
ISBN: 9781835465585
Format: ebook
Księgarnia: Helion
Cena książki: 139,00 zł
Książka będzie dostępna od października 2024
Mastering bash scripting is a powerful skill that separates professional hackers from the rest. This comprehensive guide explores bash scripting in depth, equipping you with the knowledge and tools you need to automate complex tasks, streamline workflows, and craft custom utilities.
The book takes you on a journey through advanced scripting techniques, while helping you master the command line and use practical examples that showcase real-world applications. From automating reconnaissance processes to creating custom exploitation tools, this book provides you with the skills to tackle even the most daunting challenges. You’ll discover how to utilize bash, awk, sed, and regular expressions to manipulate data, parse logs, and extract valuable information. A dedicated section also focuses on network scripting, helping you craft scripts that interact with remote systems, scan, and gather information.
By the end of this bash scripting book, you’ll be able to apply your newfound knowledge to tackle realistic scenarios, honing your skills and preparing for the front lines of cybersecurity.
Zobacz także:
- Windows Media Center. Domowe centrum rozrywki 66,67 zł, (8,00 zł -88%)
- Ruby on Rails. Ćwiczenia 18,75 zł, (3,00 zł -84%)
- Przywództwo w świecie VUCA. Jak być skutecznym liderem w niepewnym środowisku 58,64 zł, (12,90 zł -78%)
- Scrum. O zwinnym zarządzaniu projektami. Wydanie II rozszerzone 58,64 zł, (12,90 zł -78%)
- Od hierarchii do turkusu, czyli jak zarządzać w XXI wieku 58,64 zł, (12,90 zł -78%)
Spis treści
Linux Shell Scripting for Hackers. Automate and scale your hacking process with bash scripting eBook -- spis treści
- 1. Why Bash Scripting for Hackers
- 2. Hacking Lab Setup with Kali Linux
- 3. Input, Output, and File Manipulation
- 4. Reconnaissance and Scanning with Nmap
- 5. Automating Web Application Attacks
- 6. Password Cracking Technique
- 7. Delivering Payloads and Exploitation
- 8. Privilege Escalation and Post-Exploitation Actions
- 9. Wi-Fi Hacking with Bash and Aircrack-ng
- 10. Linux system hardening shell scripting
- 11. Automated Report Generation and Visualization
- 12. End-to-End Penetration Testing Projects