Cybersecurity Ops with bash: Attack, Defend, and Analyze from the Command Line

October 31, 2020
Cybersecurity Ops with bash: Attack, Defend, and Analyze from the Command Line

If you hope to outmaneuver threat actors, speed and efficiencyneed to be key components of your cybersecurity operations. Masteryof the standard command-line interface (CLI) is an invaluable skillin times of crisis because no other software application can matchthe CLI's availability, flexibility, and agility. This practicalguide shows you how to use the CLI with the bash shell to performtasks such as data collection and analysis, intrusion detection,reverse engineering, and administration.Authors Paul Troncone, founder of Digadel Corporation, and CarlAlbing, coauthor of bash Cookbook (O'Reilly), provide insight intocommand-line tools and techniques to help defensive operatorscollect data, analyze logs, and monitor networks. Penetrationtesters will learn how to leverage the enormous amount offunctionality built into nearly every version of Linux to enableoffensive operations.In four parts, security practitioners, administrators, andstudents will examine:Foundations: Principles of defense andoffense, command-line and bash basics, and regular expressionsDefensive security operations: Data collectionand analysis, real-time log monitoring, and malware analysisPenetration testing: Script obfuscation andtools for command-line fuzzing and remote accessSecurity administration: Users, groups, andpermissions; device and software inventory