Black Hat Bash
portes grátis
Black Hat Bash
Creative Scripting for Hackers and Pentesters
Farhi, Dolev; Aleks, Nick
No Starch Press,US
10/2024
336
Mole
9781718503748
Pré-lançamento - envio 15 a 20 dias após a sua edição
Descrição não disponível.
Acknowledgments
Introduction
Chapter 1: Bash Basics
Chapter 2: Flow Control and Text Processing
Chapter 3: Setting Up a Hacking Lab
Chapter 4: Reconnaissance
Chapter 5: Vulnerability Scanning and Fuzzing
Chapter 6: Gaining a Web Shell
Chapter 7: Reverse Shells
Chapter 8: Local Information Gathering
Chapter 9: Privilege Escalation
Chapter 10: Persistence
Chapter 11: Network Probing and Lateral Movement
Chapter 12: Defensive Evasion and Exfiltration
Index
Introduction
Chapter 1: Bash Basics
Chapter 2: Flow Control and Text Processing
Chapter 3: Setting Up a Hacking Lab
Chapter 4: Reconnaissance
Chapter 5: Vulnerability Scanning and Fuzzing
Chapter 6: Gaining a Web Shell
Chapter 7: Reverse Shells
Chapter 8: Local Information Gathering
Chapter 9: Privilege Escalation
Chapter 10: Persistence
Chapter 11: Network Probing and Lateral Movement
Chapter 12: Defensive Evasion and Exfiltration
Index
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
offensive security;hack;hacker;shell script;scripting;penetration tester;linux;command line;bash;application programming interface;penetration testing;ethical hacking;security testing;hacking;graphql;api;networking;security;technology;computers;hackers;computer;code;privacy;coding;algorithm;computer programming;clean code;algorithms;c programming;cybersecurity;tech;network;cyber security;cloud computing;computer networking;coding for beginners;linux command line;computer networks
Acknowledgments
Introduction
Chapter 1: Bash Basics
Chapter 2: Flow Control and Text Processing
Chapter 3: Setting Up a Hacking Lab
Chapter 4: Reconnaissance
Chapter 5: Vulnerability Scanning and Fuzzing
Chapter 6: Gaining a Web Shell
Chapter 7: Reverse Shells
Chapter 8: Local Information Gathering
Chapter 9: Privilege Escalation
Chapter 10: Persistence
Chapter 11: Network Probing and Lateral Movement
Chapter 12: Defensive Evasion and Exfiltration
Index
Introduction
Chapter 1: Bash Basics
Chapter 2: Flow Control and Text Processing
Chapter 3: Setting Up a Hacking Lab
Chapter 4: Reconnaissance
Chapter 5: Vulnerability Scanning and Fuzzing
Chapter 6: Gaining a Web Shell
Chapter 7: Reverse Shells
Chapter 8: Local Information Gathering
Chapter 9: Privilege Escalation
Chapter 10: Persistence
Chapter 11: Network Probing and Lateral Movement
Chapter 12: Defensive Evasion and Exfiltration
Index
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
offensive security;hack;hacker;shell script;scripting;penetration tester;linux;command line;bash;application programming interface;penetration testing;ethical hacking;security testing;hacking;graphql;api;networking;security;technology;computers;hackers;computer;code;privacy;coding;algorithm;computer programming;clean code;algorithms;c programming;cybersecurity;tech;network;cyber security;cloud computing;computer networking;coding for beginners;linux command line;computer networks