An easy-to-understand, step-by-step practical guide that shows you how to use the Linux Bash terminal tools to solve information security problems. If you are a penetration tester, system administrator, or developer who would like an enriching and practical introduction to the Bash shell and Kali Linux command-line-based tools, this is the book for you.
What you will learn
Perform network enumeration techniques with Dig, whois, dnsenum, dnsmap, and others
Learn how to fuzz and reverse engineer using the Kali Linux command line tools
Exploit common web application vulnerabilities using skipfish, arcachi, and sqlmap
Accomplish maninthemiddle attacks straight from your command line