Bash Shell Scripting for Pentesters
portes grátis
Bash Shell Scripting for Pentesters
Master the art of command-line exploitation and enhance penetration testing workflows
Campbell, Steve
Packt Publishing Limited
12/2024
Mole
9781835880821
Pré-lançamento - envio 15 a 20 dias após a sua edição
Descrição não disponível.
Table of Contents
File and Directory Management
Bash Command Line and its Hacking Environment
Variables, Conditionals, Loops, and Arrays
Regular Expressions
Functions and Script Organization
Bash Networking
Product Information Document
Reconnaissance and Information Gathering
Web Application Pentesting with Bash
Network and Infrastructure Pentesting with Bash
Privilege Escalation in the Bash Shell
Persistence and Pivoting
Pentest Reporting with Bash
Evasion and Obfuscation
Interfacing with Artificial Intelligence
DevSecOps for Pentesters
File and Directory Management
Bash Command Line and its Hacking Environment
Variables, Conditionals, Loops, and Arrays
Regular Expressions
Functions and Script Organization
Bash Networking
Product Information Document
Reconnaissance and Information Gathering
Web Application Pentesting with Bash
Network and Infrastructure Pentesting with Bash
Privilege Escalation in the Bash Shell
Persistence and Pivoting
Pentest Reporting with Bash
Evasion and Obfuscation
Interfacing with Artificial Intelligence
DevSecOps for Pentesters
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Table of Contents
File and Directory Management
Bash Command Line and its Hacking Environment
Variables, Conditionals, Loops, and Arrays
Regular Expressions
Functions and Script Organization
Bash Networking
Product Information Document
Reconnaissance and Information Gathering
Web Application Pentesting with Bash
Network and Infrastructure Pentesting with Bash
Privilege Escalation in the Bash Shell
Persistence and Pivoting
Pentest Reporting with Bash
Evasion and Obfuscation
Interfacing with Artificial Intelligence
DevSecOps for Pentesters
File and Directory Management
Bash Command Line and its Hacking Environment
Variables, Conditionals, Loops, and Arrays
Regular Expressions
Functions and Script Organization
Bash Networking
Product Information Document
Reconnaissance and Information Gathering
Web Application Pentesting with Bash
Network and Infrastructure Pentesting with Bash
Privilege Escalation in the Bash Shell
Persistence and Pivoting
Pentest Reporting with Bash
Evasion and Obfuscation
Interfacing with Artificial Intelligence
DevSecOps for Pentesters
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.