Key Features
Book Description
An easy-to-understand, step-by-step practical guide that shows you how to use the Linux Bash terminal tools to solve information security problems. If you are a penetration tester, system administrator, or developer who would like an enriching and practical introduction to the Bash shell and Kali Linux command-line-based tools, this is the book for you.What you will learn
- Perform network enumeration techniques with Dig, whois, dnsenum, dnsmap, and others
- Learn how to fuzz and reverse engineer using the Kali Linux command line tools
- Exploit common web application vulnerabilities using skipfish, arcachi, and sqlmap
- Accomplish maninthemiddle attacks straight from your command line
- Assess SSL security using sslyze and openssl
- Carry out network traffic analysis using tcpdump
Who this book is for
Table of Contents
Loading...
Loading...
Loading...

