|
![]() |
|||
|
||||
OverviewLevel up your pentesting skills by learning how to perform advanced system reconnaissance, and streamline offensive operations with command-line scripting Key Features Learn how to apply key attributes of Bash to accomplish common penetration testing tasks Understand how Bash can connect to AI-driven tools to strengthen cybersecurity assessments Configure a Bash environment with essential tools such as curl, openssl, nmap, and more Purchase of the print or Kindle book includes a free PDF eBook Book DescriptionBash shell scripting is essential for penetration testing because it’s versatile and efficient and integrates thoroughly with the Unix-based systems commonly used in cybersecurity assessments. In this book, the author leverages his decades of experience in IT and pentesting to help you automate repetitive tasks, rapidly analyze data, and craft sophisticated exploits, boosting your effectiveness and productivity. You’ll get to grips with Bash basics, set up a hacking environment, and create basic scripts, before exploring file management, text processing, and manipulation. The chapters will guide you through advanced topics such as networking, parallel processing, and regular expressions. From there, the book will move on to practical applications, walking you through reconnaissance, web application and infrastructure pentesting, privilege escalation, persistence, and pivoting, all using Bash scripting. You’ll also get a solid understanding of advanced topics, including evasion and obfuscation tactics, integrating AI into penetration testing workflows, and implementing DevSecOps practices. By the end of this book, you’ll be well-versed with Bash shell scripting techniques tailored to penetration testing scenarios.What you will learn Understand Bash's role in pentesting and set up a suitable environment Become proficient in file manipulation, navigation, and permissions Find out how to use regex for text matching and manipulation Extract and manipulate text efficiently using Bash Utilize Bash functions and script organization to create an efficient workflow Perform network enumeration, exploitation, and analysis using Bash Harness the power of parallelism for more efficient task handling Explore advanced subjects, including evasion, AI integration, and DevSecOps automation Who this book is forThis book is for penetration testers, cybersecurity professionals, and enthusiasts who want to enhance their skills with Bash shell scripting, as well as gain practical knowledge for automating tasks, analyzing data, and developing automation within penetration testing scenarios. A basic understanding of Unix-based systems and familiarity with fundamental penetration testing concepts are necessary. Full Product DetailsAuthor: Steve Campbell , David KennedyPublisher: Packt Publishing Limited Imprint: Packt Publishing Limited ISBN: 9781835880821ISBN 10: 1835880827 Pages: 402 Publication Date: 27 December 2024 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Available To Order ![]() We have confirmation that this item is in stock with the supplier. It will be ordered in for you and dispatched immediately. Table of ContentsTable of Contents Bash Command-Line and Its Hacking Environment File and Directory Management Variables, Conditionals, Loops, and Arrays Regular Expressions Functions and Script Organization Bash Networking Parallel Processing Reconnaissance and Information Gathering Web Application Pentesting with Bash Network and Infrastructure Pentesting with Bash Privilege Escalation in the Bash Shell Persistence and Pivoting Pentest Reporting with Bash Evasion and Obfuscation Interfacing with Artificial Intelligence DevSecOps for PentestersReviewsAuthor InformationSteve Campbell is a technical lead on the CDW Offensive Security team. He is a retired Navy veteran who previously worked with aviation electrical and electronics systems before transitioning to information technology (IT). He possesses over 19 years of combined experience in IT and penetration testing. He has planned, scoped, led, and performed penetration testing engagements on various major enterprises, such as Fortune 500, government institutions, banking, finance, healthcare and insurance, e-commerce, legal, and energy sector clients. His achievements include the identification of seven vulnerabilities published as CVE, along with contributions to open source tools such as the Metasploit Framework. Tab Content 6Author Website:Countries AvailableAll regions |