Креативный скриптинг для хакеров и пентестеров
Acknowledgments xvii
Introduction xix
Chapter 1: Bash Basics 1
Chapter 2: Flow Control and Text Processing 27
Chapter 3: Setting Up a Hacking Lab 51
Chapter 4: Reconnaissance 69
Chapter 5: Vulnerability Scanning and Fuzzing 95
Chapter 6: Gaining a Web Shell 117
Chapter 7: Reverse Shells 143
Chapter 8: Local Information Gathering 163
Chapter 9: Privilege Escalation 201
Chapter 10: Persistence 233
Chapter 11: Network Probing and Lateral Movement 257
Chapter 12: Defense Evasion and Exfiltration 281
Index 307
Introduction xix
Chapter 1: Bash Basics 1
Chapter 2: Flow Control and Text Processing 27
Chapter 3: Setting Up a Hacking Lab 51
Chapter 4: Reconnaissance 69
Chapter 5: Vulnerability Scanning and Fuzzing 95
Chapter 6: Gaining a Web Shell 117
Chapter 7: Reverse Shells 143
Chapter 8: Local Information Gathering 163
Chapter 9: Privilege Escalation 201
Chapter 10: Persistence 233
Chapter 11: Network Probing and Lateral Movement 257
Chapter 12: Defense Evasion and Exfiltration 281
Index 307
Пароль: xss.pro
7.99 MB file on MEGA
Последнее редактирование: