skip to content
Cybersecurity Ops with bash : attack, defend, and analyze from the command line Preview this item
ClosePreview this item
Checking...

Cybersecurity Ops with bash : attack, defend, and analyze from the command line

Author: Paul Troncone; Carl Albing
Publisher: Beijing : O'Reilly Media, 2019.
Edition/Format:   eBook : Document : English : First editionView all editions and formats
Summary:
If you hope to outmaneuver threat actors, speed and efficiency need to be key components of your cybersecurity operations. Mastery of the standard command-line interface (CLI) is an invaluable skill in times of crisis because no other software application can match the CLI's availability, flexibility, and agility. This practical guide shows you how to use the CLI with the bash shell to perform tasks such as data  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Troncone, Paul.
Cybersecurity Ops with bash.
Beijing : O'Reilly Media, 2019
(OCoLC)1057856082
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Paul Troncone; Carl Albing
ISBN: 9781492041283 1492041289
OCLC Number: 1091234859
Description: 1 online resource : illustrations
Contents: Intro; Copyright; Table of Contents; Preface; Who This Book Is For; Bash or bash; Script Robustness; Workshops; Conventions Used in This Book; Using Code Examples; O'Reilly Online Learning; How to Contact Us; Acknowledgments; Disclaimer; Part I. Foundations; Chapter 1. Command-Line Primer; The Command Line Defined; Why bash?; Command-Line Illustrations; Running Linux and bash on Windows; Git Bash; Cygwin; Windows Subsystem for Linux; Windows Command Prompt and PowerShell; Command-Line Basics; Commands, Arguments, Built-ins, and Keywords; Standard Input/Output/Error; Redirection and Piping Running Commands in the BackgroundFrom Command Line to Script; Summary; Workshop; Chapter 2. Bash Primer; Output; Variables; Positional Parameters; Input; Conditionals; Looping; Functions; Function Arguments; Returning Values; Pattern Matching in bash; Writing Your First Script-Detecting Operating System Type; Summary; Workshop; Chapter 3. Regular Expressions Primer; Commands in Use; grep; grep and egrep; Regular Expression Metacharacters; The "." Metacharacter; The "?" Metacharacter; The "*" Metacharacter; The "+" Metacharacter; Grouping; Brackets and Character Classes; Back References QuantifiersAnchors and Word Boundaries; Summary; Workshop; Chapter 4. Principles of Defense and Offense; Cybersecurity; Confidentiality; Integrity; Availability; Nonrepudiation; Authentication; The Attack Life Cycle; Reconnaissance; Initial Exploitation; Establish Foothold; Escalate Privileges; Internal Reconnaissance; Lateral Movement; Maintain Presence; Complete Mission; Summary; Part II. Defensive Security Operations with bash; Chapter 5. Data Collection; Commands in Use; cut; file; head; reg; wevtutil; Gathering System Information; Executing a Command Remotely Using SSH Gathering Linux LogfilesGathering Windows Logfiles; Gathering System Information; Gathering the Windows Registry; Searching the Filesystem; Searching by Filename; Searching for Hidden Files; Searching by File Size; Searching by Time; Searching for Content; Searching by File Type; Searching by Message Digest Value; Transferring Data; Summary; Workshop; Chapter 6. Data Processing; Commands in Use; awk; join; sed; tail; tr; Processing Delimited Files; Iterating Through Delimited Data; Processing by Character Position; Processing XML; Processing JSON; Aggregating Data; Summary; Workshop Chapter 7. Data AnalysisCommands in Use; sort; uniq; Web Server Access Log Familiarization; Sorting and Arranging Data; Counting Occurrences in Data; Totaling Numbers in Data; Displaying Data in a Histogram; Finding Uniqueness in Data; Identifying Anomalies in Data; Summary; Workshop; Chapter 8. Real-Time Log Monitoring; Monitoring Text Logs; Log-Based Intrusion Detection; Monitoring Windows Logs; Generating a Real-Time Histogram; Summary; Workshop; Chapter 9. Tool: Network Monitor; Commands in Use; crontab; schtasks; Step 1: Creating a Port Scanner; Step 2: Comparing to Previous Output
Responsibility: Paul Troncone and Carl Albing.

Abstract:

This practical guide shows you how to use the CLI with the bash shell to perform tasks such as data collection and analysis, intrusion detection, reverse engineering, and administration.  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/1091234859> # Cybersecurity Ops with bash : attack, defend, and analyze from the command line
    a schema:Book, schema:CreativeWork, schema:MediaObject ;
    library:oclcnum "1091234859" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/cc> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/9079643321#Topic/computers_security_networking> ; # COMPUTERS--Security--Networking
    schema:about <http://experiment.worldcat.org/entity/work/data/9079643321#Topic/computer_security> ; # Computer security
    schema:about <http://experiment.worldcat.org/entity/work/data/9079643321#Topic/computer_networks_security_measures> ; # Computer networks--Security measures
    schema:about <http://dewey.info/class/005.8/e23/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/9079643321#Topic/computer_crimes_economic_aspects> ; # Computer crimes--Economic aspects
    schema:author <http://experiment.worldcat.org/entity/work/data/9079643321#Person/albing_carl> ; # Carl Albing
    schema:author <http://experiment.worldcat.org/entity/work/data/9079643321#Person/troncone_paul> ; # Paul Troncone
    schema:bookEdition "First edition." ;
    schema:bookFormat schema:EBook ;
    schema:datePublished "2019" ;
    schema:description "If you hope to outmaneuver threat actors, speed and efficiency need to be key components of your cybersecurity operations. Mastery of the standard command-line interface (CLI) is an invaluable skill in times of crisis because no other software application can match the CLI's availability, flexibility, and agility. This practical guide shows you how to use the CLI with the bash shell to perform tasks such as data collection and analysis, intrusion detection, reverse engineering, and administration. Authors Paul Troncone, founder of Digadel Corporation, and Carl Albing, coauthor of bash cookbook (O'Reilly), provide insight into command-line tools and techniques to help defensive operators collect data, analyze logs, and monitor networks. Penetration testers will learn how to leverage the enormous amount of functionality built into nearly every version of Linux to enable offensive operations."@en ;
    schema:description "Intro; Copyright; Table of Contents; Preface; Who This Book Is For; Bash or bash; Script Robustness; Workshops; Conventions Used in This Book; Using Code Examples; O'Reilly Online Learning; How to Contact Us; Acknowledgments; Disclaimer; Part I. Foundations; Chapter 1. Command-Line Primer; The Command Line Defined; Why bash?; Command-Line Illustrations; Running Linux and bash on Windows; Git Bash; Cygwin; Windows Subsystem for Linux; Windows Command Prompt and PowerShell; Command-Line Basics; Commands, Arguments, Built-ins, and Keywords; Standard Input/Output/Error; Redirection and Piping"@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/9079643321> ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/1057856082> ;
    schema:name "Cybersecurity Ops with bash : attack, defend, and analyze from the command line"@en ;
    schema:productID "1091234859" ;
    schema:url <https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2095286> ;
    schema:url <http://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9781492041283> ;
    schema:url <http://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9781492041269> ;
    schema:url <https://public.ebookcentral.proquest.com/choice/publicfullrecord.aspx?p=5744443> ;
    schema:workExample <http://worldcat.org/isbn/9781492041283> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/1091234859> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/9079643321#Person/albing_carl> # Carl Albing
    a schema:Person ;
    schema:familyName "Albing" ;
    schema:givenName "Carl" ;
    schema:name "Carl Albing" ;
    .

<http://experiment.worldcat.org/entity/work/data/9079643321#Person/troncone_paul> # Paul Troncone
    a schema:Person ;
    schema:familyName "Troncone" ;
    schema:givenName "Paul" ;
    schema:name "Paul Troncone" ;
    .

<http://experiment.worldcat.org/entity/work/data/9079643321#Topic/computer_crimes_economic_aspects> # Computer crimes--Economic aspects
    a schema:Intangible ;
    schema:name "Computer crimes--Economic aspects"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/9079643321#Topic/computer_networks_security_measures> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/9079643321#Topic/computer_security> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/9079643321#Topic/computers_security_networking> # COMPUTERS--Security--Networking
    a schema:Intangible ;
    schema:name "COMPUTERS--Security--Networking"@en ;
    .

<http://worldcat.org/isbn/9781492041283>
    a schema:ProductModel ;
    schema:isbn "1492041289" ;
    schema:isbn "9781492041283" ;
    .

<http://www.worldcat.org/oclc/1057856082>
    a schema:CreativeWork ;
    rdfs:label "Cybersecurity Ops with bash." ;
    schema:description "Print version:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/1091234859> ; # Cybersecurity Ops with bash : attack, defend, and analyze from the command line
    .

<http://www.worldcat.org/title/-/oclc/1091234859>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
    schema:about <http://www.worldcat.org/oclc/1091234859> ; # Cybersecurity Ops with bash : attack, defend, and analyze from the command line
    schema:dateModified "2019-10-19" ;
    void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.