Pen Testing with Bash
Perfecting Bash is essential for pen testers since it is one of the greatest tools out there. This course will teach you how to utilize Bash and Bash scripting in penetration testing.
Bash is a widely-used and highly regarded tool for shell scripting and command line interface operations. It is known for its versatility, robustness, and standardization across Unix-like operating systems. In this course, Pen Testing with Bash, you’ll learn to utilize this powerful tool for pen testing. First, you’ll explore reconnaissance and enumeration using Bash scripting. Next, you’ll discover how to move inside the network and maintain presence inside a host. After that, you’ll experience how to escalate privileges. Finally, you’ll learn how to do all these skills in a stealthy manner. When you’re finished with this course, you’ll have the skills and knowledge of Bash and Bash scripting needed for a daily routine of penetration testing.
Author Name: Malek Mohammad
Author Description:
Malek Mohammad is an Information Security Consultant and Penetration Tester with previous software development experience. Malek works on making payment applications more secure through Penetration Testing and Threat Modeling. In addition, He helped many software developers in designing their application with security in mind, and not as an afterthought. Malek still has enthusiasm for software development, he uses Python to automate attack scenarios.
Table of Contents
- Course Overview
1min - Network Reconnaissance and Enumeration
28mins - Establish a Foothold in a Network
13mins - Establish a Foothold in a Host
7mins - Stealth
7mins
There are no reviews yet.