Book Image

Penetration Testing with the Bash shell

By : Keith Harald Esrick Makan
Book Image

Penetration Testing with the Bash shell

By: Keith Harald Esrick Makan

Overview of this book

Table of Contents (13 chapters)

Chapter 2. Customizing Your Shell

Almost every aspect of your bash terminal is customizable. Now that you've learned to make use of some of the important information processing utilities, we can move on to learning how to use them to customize your shell. A lot of what we will cover in this chapter involves grabbing information from one program, piping it into another program, and filtering out whatever details are important to us.

You will also learn something about bash scripting, which is what a large chunks of the applications in your Kali Linux—and the larger Linux family—are made of.