Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Preface
Who This Book Is For Bash or bash Script Robustness Workshops Conventions Used in This Book Using Code Examples O’Reilly Online Learning How to Contact Us Acknowledgments Disclaimer
I. Foundations 1. Command-Line Primer
The Command Line Defined Why bash? Command-Line Illustrations Running Linux and bash on Windows
Git Bash Cygwin Windows Subsystem for Linux Windows Command Prompt and PowerShell
Command-Line Basics
Commands, Arguments, Built-ins, and Keywords Standard Input/Output/Error Redirection and Piping Running Commands in the Background From Command Line to Script
Summary Workshop
2. Bash Primer
Output Variables
Positional Parameters
Input Conditionals Looping Functions
Function Arguments Returning Values
Pattern Matching in bash Writing Your First Script—Detecting Operating System Type Summary Workshop
3. Regular Expressions Primer
Commands in Use
grep grep and egrep
Regular Expression Metacharacters
The “.” Metacharacter The “?” Metacharacter The “*” Metacharacter The “+” Metacharacter Grouping Brackets and Character Classes Back References Quantifiers Anchors and Word Boundaries
Summary Workshop
4. Principles of Defense and Offense
Cybersecurity
Confidentiality Integrity Availability Nonrepudiation Authentication
The Attack Life Cycle
Reconnaissance Initial Exploitation Establish Foothold Escalate Privileges Internal Reconnaissance Lateral Movement Maintain Presence Complete Mission
Summary
II. Defensive Security Operations with bash 5. Data Collection
Commands in Use
cut file head reg wevtutil
Gathering System Information
Executing a Command Remotely Using SSH Gathering Linux Logfiles Gathering Windows Logfiles Gathering System Information Gathering the Windows Registry
Searching the Filesystem
Searching by Filename Searching for Hidden Files Searching by File Size Searching by Time Searching for Content Searching by File Type Searching by Message Digest Value
Transferring Data Summary Workshop
6. Data Processing
Commands in Use
awk join sed tail tr
Processing Delimited Files
Iterating Through Delimited Data Processing by Character Position
Processing XML Processing JSON Aggregating Data Summary Workshop
7. Data Analysis
Commands in Use
sort uniq
Web Server Access Log Familiarization Sorting and Arranging Data Counting Occurrences in Data Totaling Numbers in Data Displaying Data in a Histogram Finding Uniqueness in Data Identifying Anomalies in Data Summary Workshop
8. Real-Time Log Monitoring
Monitoring Text Logs
Log-Based Intrusion Detection
Monitoring Windows Logs Generating a Real-Time Histogram Summary Workshop
9. Tool: Network Monitor
Commands in Use
crontab schtasks
Step 1: Creating a Port Scanner Step 2: Comparing to Previous Output Step 3: Automation and Notification
Scheduling a Task in Linux Scheduling a Task in Windows
Summary Workshop
10. Tool: Filesystem Monitor
Commands in Use
sdiff
Step 1: Baselining the Filesystem Step 2: Detecting Changes to the Baseline Step 3: Automation and Notification Summary Workshop
11. Malware Analysis
Commands in Use
curl vi xxd
Reverse Engineering
Hexadecimal, Decimal, Binary, and ASCII Conversions Analyzing with xxd
Extracting Strings Interfacing with VirusTotal
Searching the Database by Hash Value Scanning a File Scanning URLs, Domains, and IP Addresses
Summary Workshop
12. Formatting and Reporting
Commands in Use
tput
Formatting for Display and Print with HTML Creating a Dashboard Summary Workshop
III. Penetration Testing with bash 13. Reconnaissance
Commands in Use
ftp
Crawling Websites Automated Banner Grabbing Summary Workshop
14. Script Obfuscation
Commands in Use
base64 eval
Obfuscating Syntax Obfuscating Logic Encrypting
Cryptography Primer Encrypting the Script Creating the Wrapper Creating Your Own Crypto
Summary Workshop
15. Tool: Command-Line Fuzzer
Implementation Summary Workshop
16. Establishing a Foothold
Commands in Use
nc
Single-Line Backdoors
Reverse SSH Bash Backdoor
Custom Remote-Access Tool
Implementation
Summary Workshop
IV. Security Administration with bash 17. Users, Groups, and Permissions
Commands in Use
chmod chown getfacl groupadd setfacl useradd usermod icacls net
Users and Groups
Creating Linux Users and Groups Creating Windows Users and Groups
File Permissions and Access Control Lists
Linux File Permissions Windows File Permissions
Making Bulk Changes Summary Workshop
18. Writing Log Entries
Commands in Use
eventcreate logger
Writing Windows Logs Writing Linux Logs Summary Workshop
19. Tool: System Availability Monitor
Commands in Use
ping
Implementation Summary Workshop
20. Tool: Software Inventory
Commands in Use
apt dpkg wmic yum
Implementation Identifying Other Software Summary Workshop
21. Tool: Validating Configuration
Implementation Summary Workshop
22. Tool: Account Auditing
Have I Been Pwned? Checking for a Breached Password Checking for a Breached Email Address
Batch-Processing Emails
Summary Workshop
23. Conclusion Index
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion