توضیحاتی در مورد کتاب Cybersecurity Ops with bash: attack, defend and analyze from the command line
نام کتاب : Cybersecurity Ops with bash: attack, defend and analyze from the command line
عنوان ترجمه شده به فارسی : امنیت سایبری با Bash: حمله ، دفاع و تجزیه و تحلیل از خط فرمان
سری :
نویسندگان : Paul Troncone, Carl Albing
ناشر :
سال نشر :
تعداد صفحات : 524
ISBN (شابک) : 9781492041313
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 3 مگابایت
بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.
فهرست مطالب :
Preface
Who This Book Is For
Bash or bash
Script Robustness
Workshops
Conventions Used in This Book
Using Code Examples
O’Reilly Online Learning
How to Contact Us
Acknowledgments
Disclaimer
I. Foundations
1. Command-Line Primer
The Command Line Defined
Why bash?
Command-Line Illustrations
Running Linux and bash on Windows
Git Bash
Cygwin
Windows Subsystem for Linux
Windows Command Prompt and PowerShell
Command-Line Basics
Commands, Arguments, Built-ins, and Keywords
Standard Input/Output/Error
Redirection and Piping
Running Commands in the Background
From Command Line to Script
Summary
Workshop
2. Bash Primer
Output
Variables
Positional Parameters
Input
Conditionals
Looping
Functions
Function Arguments
Returning Values
Pattern Matching in bash
Writing Your First Script—Detecting Operating System Type
Summary
Workshop
3. Regular Expressions Primer
Commands in Use
grep
Common command options
Command example
grep and egrep
Regular Expression Metacharacters
The “.” Metacharacter
The “?” Metacharacter
The “*” Metacharacter
The “+” Metacharacter
Grouping
Brackets and Character Classes
Back References
Quantifiers
Anchors and Word Boundaries
Summary
Workshop
4. Principles of Defense and Offense
Cybersecurity
Confidentiality
Integrity
Availability
Nonrepudiation
Authentication
The Attack Life Cycle
Reconnaissance
Initial Exploitation
Establish Foothold
Escalate Privileges
Internal Reconnaissance
Lateral Movement
Maintain Presence
Complete Mission
Summary
II. Defensive Security Operations with bash
5. Data Collection
Commands in Use
cut
Common command options
Command example
file
Common command options
Command example
head
Common command options
reg
Common command parameters
Command example
wevtutil
Common command parameters
Common command options
Command example
Gathering System Information
Executing a Command Remotely Using SSH
Gathering Linux Logfiles
Gathering Windows Logfiles
Gathering System Information
Gathering the Windows Registry
Searching the Filesystem
Searching by Filename
Searching for Hidden Files
Searching by File Size
Searching by Time
Searching for Content
Searching by File Type
Searching by Message Digest Value
Transferring Data
Summary
Workshop
6. Data Processing
Commands in Use
awk
Common command options
Command example
join
Common command options
Command example
sed
Common command options
Command example
tail
Common command options
Command example
tr
Common command options
Command example
Processing Delimited Files
Iterating Through Delimited Data
Processing by Character Position
Processing XML
Processing JSON
Aggregating Data
Summary
Workshop
7. Data Analysis
Commands in Use
sort
Common command options
Command example
uniq
Common command options
Web Server Access Log Familiarization
Sorting and Arranging Data
Counting Occurrences in Data
Totaling Numbers in Data
Displaying Data in a Histogram
Finding Uniqueness in Data
Identifying Anomalies in Data
Summary
Workshop
8. Real-Time Log Monitoring
Monitoring Text Logs
Log-Based Intrusion Detection
Monitoring Windows Logs
Generating a Real-Time Histogram
Summary
Workshop
9. Tool: Network Monitor
Commands in Use
crontab
Common command options
schtasks
Common command options
Step 1: Creating a Port Scanner
Step 2: Comparing to Previous Output
Step 3: Automation and Notification
Scheduling a Task in Linux
Scheduling a Task in Windows
Summary
Workshop
10. Tool: Filesystem Monitor
Commands in Use
sdiff
Common command options
Command example
Step 1: Baselining the Filesystem
Step 2: Detecting Changes to the Baseline
Step 3: Automation and Notification
Summary
Workshop
11. Malware Analysis
Commands in Use
curl
Common command options
Command example
vi
Command example
xxd
Common command options
Command example
Reverse Engineering
Hexadecimal, Decimal, Binary, and ASCII Conversions
Analyzing with xxd
Hex editor
Extracting Strings
Interfacing with VirusTotal
Searching the Database by Hash Value
Scanning a File
Scanning URLs, Domains, and IP Addresses
Summary
Workshop
12. Formatting and Reporting
Commands in Use
tput
Common command parameters
Formatting for Display and Print with HTML
Creating a Dashboard
Summary
Workshop
III. Penetration Testing with bash
13. Reconnaissance
Commands in Use
ftp
Common command options
Command example
Crawling Websites
Automated Banner Grabbing
Summary
Workshop
14. Script Obfuscation
Commands in Use
base64
Common command options
Command example
eval
Command example
Obfuscating Syntax
Obfuscating Logic
Encrypting
Cryptography Primer
Encryption
Decryption
Cryptographic key
Encrypting the Script
Creating the Wrapper
Creating Your Own Crypto
Summary
Workshop
15. Tool: Command-Line Fuzzer
Implementation
Summary
Workshop
16. Establishing a Foothold
Commands in Use
nc
Common command options
Command example
Single-Line Backdoors
Reverse SSH
Bash Backdoor
Custom Remote-Access Tool
Implementation
Summary
Workshop
IV. Security Administration with bash
17. Users, Groups, and Permissions
Commands in Use
chmod
Common command options
chown
Common command options
getfacl
Common command options
groupadd
Common command options
setfacl
Common command options
useradd
Common command options
usermod
Common command options
icacls
Common command options
net
Common command options
Users and Groups
Creating Linux Users and Groups
Creating Windows Users and Groups
File Permissions and Access Control Lists
Linux File Permissions
Linux access control lists
Windows File Permissions
Making Bulk Changes
Summary
Workshop
18. Writing Log Entries
Commands in Use
eventcreate
Common command options
logger
Common command options
Writing Windows Logs
Writing Linux Logs
Summary
Workshop
19. Tool: System Availability Monitor
Commands in Use
ping
Common command options
Command example
Implementation
Summary
Workshop
20. Tool: Software Inventory
Commands in Use
apt
Common command options
Command example
dpkg
Common command options
Command example
wmic
Common command options
Command example
yum
Common command options
Command example
Implementation
Identifying Other Software
Summary
Workshop
21. Tool: Validating Configuration
Implementation
Summary
Workshop
22. Tool: Account Auditing
Have I Been Pwned?
Checking for a Breached Password
Checking for a Breached Email Address
Batch-Processing Emails
Summary
Workshop
23. Conclusion
Index