- ホーム
- > 洋書
- > 英文書
- > Computer / General
Full Description
Level up your pentesting skills by learning how to perform advanced system reconnaissance, and streamline offensive operations with command-line scripting
Key Features
Learn how to apply key attributes of Bash to accomplish common penetration testing tasks
Understand how Bash can connect to AI-driven tools to strengthen cybersecurity assessments
Configure a Bash environment with essential tools such as curl, openssl, nmap, and more
Purchase of the print or Kindle book includes a free PDF eBook
Book DescriptionBash shell scripting is essential for penetration testing because it's versatile and efficient and integrates thoroughly with the Unix-based systems commonly used in cybersecurity assessments. In this book, the author leverages his decades of experience in IT and pentesting to help you automate repetitive tasks, rapidly analyze data, and craft sophisticated exploits, boosting your effectiveness and productivity.
You'll get to grips with Bash basics, set up a hacking environment, and create basic scripts, before exploring file management, text processing, and manipulation. The chapters will guide you through advanced topics such as networking, parallel processing, and regular expressions. From there, the book will move on to practical applications, walking you through reconnaissance, web application and infrastructure pentesting, privilege escalation, persistence, and pivoting, all using Bash scripting. You'll also get a solid understanding of advanced topics, including evasion and obfuscation tactics, integrating AI into penetration testing workflows, and implementing DevSecOps practices.
By the end of this book, you'll be well-versed with Bash shell scripting techniques tailored to penetration testing scenarios.What you will learn
Understand Bash's role in pentesting and set up a suitable environment
Become proficient in file manipulation, navigation, and permissions
Find out how to use regex for text matching and manipulation
Extract and manipulate text efficiently using Bash
Utilize Bash functions and script organization to create an efficient workflow
Perform network enumeration, exploitation, and analysis using Bash
Harness the power of parallelism for more efficient task handling
Explore advanced subjects, including evasion, AI integration, and DevSecOps automation
Who this book is forThis book is for penetration testers, cybersecurity professionals, and enthusiasts who want to enhance their skills with Bash shell scripting, as well as gain practical knowledge for automating tasks, analyzing data, and developing automation within penetration testing scenarios. A basic understanding of Unix-based systems and familiarity with fundamental penetration testing concepts are necessary.
Contents
Table of Contents
Bash Command-Line and Its Hacking Environment
File and Directory Management
Variables, Conditionals, Loops, and Arrays
Regular Expressions
Functions and Script Organization
Bash Networking
Parallel Processing
Reconnaissance and Information Gathering
Web Application Pentesting with Bash
Network and Infrastructure Pentesting with Bash
Privilege Escalation in the Bash Shell
Persistence and Pivoting
Pentest Reporting with Bash
Evasion and Obfuscation
Interfacing with Artificial Intelligence
DevSecOps for Pentesters