Cybersecurity Ops with bash attack, defend, and analyze from the command line
If you hope to outmaneuver threat actors, speed and efficiency need to be key components of your cybersecurity operations. Mastery of the standard command-line interface (CLI) is an invaluable skill in times of crisis because no other software application can match the CLI's availability, flexi...
Saved in:
| Main Authors: | , |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Sebastopol, CA
O'Reilly Media, Inc.
2019.
|
| Edition: | First edition. |
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Table of Contents:
- Part 1. Foundations. Command-line primer
- Bash primer
- Regular expressions primer
- Principles of defense and offense
- Part 2. Defensive security operations with bash. Data collection
- Data processing
- Data analysis
- Real-time log monitoring
- Tool : network monitor
- Tool : filesystem monitor
- Malware analysis
- Formatting and reporting
- Part 3. Penetration testing with bash. Reconnaissance
- Script obfuscation
- Tool : command-line fuzzer
- Establishing a foothold
- Part 4. Security administration with bash. Users, groups, and permissions
- Writing log entries
- Tool : system availability monitor
- Tool : software inventory
- Tool : validating configuration
- Tool : account auditing
- Conclusion.


