Cybersecurity Ops with bash attack, defend, and analyze from the command line

If you hope to outmaneuver threat actors, speed and efficiency need to be key components of your cybersecurity operations. Mastery of the standard command-line interface (CLI) is an invaluable skill in times of crisis because no other software application can match the CLI's availability, flexi...

Full description

Saved in:
Bibliographic Details
Main Authors: Troncone, Paul (Author), Albing, Carl (Author)
Format: Book
Language:English
Published: Sebastopol, CA O'Reilly Media, Inc. 2019.
Edition:First edition.
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
Table of Contents:
  • Part 1. Foundations. Command-line primer
  • Bash primer
  • Regular expressions primer
  • Principles of defense and offense
  • Part 2. Defensive security operations with bash. Data collection
  • Data processing
  • Data analysis
  • Real-time log monitoring
  • Tool : network monitor
  • Tool : filesystem monitor
  • Malware analysis
  • Formatting and reporting
  • Part 3. Penetration testing with bash. Reconnaissance
  • Script obfuscation
  • Tool : command-line fuzzer
  • Establishing a foothold
  • Part 4. Security administration with bash. Users, groups, and permissions
  • Writing log entries
  • Tool : system availability monitor
  • Tool : software inventory
  • Tool : validating configuration
  • Tool : account auditing
  • Conclusion.