Penetration Testing with the Bash shell
By Keith Makan
Publisher: Packt Publishing
Final Release Date: May 2014
Pages: 150

In Detail

This book teaches you to take your problem solving capabilities to the next level with the Bash shell, to assess network and application level security by leveraging the power of the command-line tools available with Kali Linux.

The book begins by introducing some of the fundamental bash scripting and information processing tools. Building on this, the next few chapters focus on detailing ways to customize your Bash shell using functionalities such as tab completion and rich text formatting. After the fundamental customization techniques and general purpose tools have been discussed, the book breaks into topics such as the command-line-based security tools in the Kali Linux operating system. The general approach in discussing these tools is to involve general purpose tools discussed in previous chapters to integrate security assessment tools. This is a one stop solution to learn Bash and solve information security problems.

Approach

An easy-to-understand, step-by-step practical guide that shows you how to use the Linux Bash terminal tools to solve information security problems.

Who this book is for

If you are a penetration tester, system administrator, or developer who would like an enriching and practical introduction to the Bash shell and Kali Linux command-line-based tools, this is the book for you.

Product Details
Recommended for You
Customer Reviews

REVIEW SNAPSHOT®

by PowerReviews
oreillyPenetration Testing with the Bash shell
 
2.0

(based on 2 reviews)

Ratings Distribution

  • 5 Stars

     

    (0)

  • 4 Stars

     

    (0)

  • 3 Stars

     

    (1)

  • 2 Stars

     

    (0)

  • 1 Stars

     

    (1)

Reviewed by 2 customers

Sort by

Displaying reviews 1-2

Back to top

 
1.0

find something else...

By Maikcat

from Greece

About Me Sys Admin

Verified Reviewer

Pros

    Cons

    • Too many errors

    Best Uses

      Comments about oreilly Penetration Testing with the Bash shell:

      some things (ch1 page 12)like cd-- which btw even exists?)and redirection (chapter 2 page 24) statement like:
      [command line] 2>&1 > [output file]
      makes me wonder if the author really knows how redirection really works..

      short comment: stay away

       
      3.0

      Good introduction to penetration testing

      By Bernie Ongewe

      from Lowell, MA

      About Me Designer, Sys Admin

      Pros

      • Accurate
      • Easy to understand
      • Helpful examples
      • Well-written

      Cons

      • Not comprehensive enough

      Best Uses

      • Novice

      Comments about oreilly Penetration Testing with the Bash shell:

      If you are new to the arena of penetration testing, this is a good introduction to the tools available (Kali Linux, etc). After this, you'll certainly want to explore resources that take you deeper into their use.

      Displaying reviews 1-2

      Back to top

       
      Buy 2 Get 1 Free Free Shipping Guarantee
      Buying Options
      Immediate Access - Go Digital what's this?
      Ebook: $13.99
      Formats:  ePub, Mobi, PDF