TCPDump filters at http://www.wains.be/pub/networking/tcpdump_advanced_filters.txt (accessed 2014/03/30)
TCPDump manual at http://www.tcpdump.org/manpages/tcpdump.1.html (accessed 2014/03/30)
TCPDump filters at http://www.cs.ucr.edu/~marios/ethereal-tcpdump.pdf (accessed 2014/03/30)
TCPDump & libpacp at http://www.tcpdump.org/ (accessed 2014/03/30)
An Ethernet Address Resolution Protocol at http://tools.ietf.org/html/rfc826 (accessed 2014/04/03)
SSLyze Github page at https://github.com/iSECPartners/sslyze (accessed 2014/03/30)
SSL Deployment Best Practices at https://www.ssllabs.com/downloads/SSL_TLS_Deployment_Best_Practices_1.3.pdf September 2013, (accessed 2014/04/03)
The Transport Layer Security (TLS) Protocol Version 1.2 at http://tools.ietf.org/html/rfc5246 (accessed 2014/03/30)
The Secure Socket Layer (SSL) Protocol Version 3.0 at http://tools.ietf.org/html/rfc6101 (accessed 2014/03/30)
Analysis of the SSL 3.0 Protocol at https://www.schneier.com/paper-ssl.pdf (accessed...
Penetration Testing with the Bash shell
By :
Penetration Testing with the Bash shell
By:
Overview of this book
Table of Contents (13 chapters)
Penetration Testing with the Bash shell
Credits
Disclaimer
About the Author
About the Reviewers
www.PacktPub.com
Preface
Free Chapter
Getting to Know Bash
Customizing Your Shell
Network Reconnaissance
Exploitation and Reverse Engineering
Network Exploitation and Monitoring
Index
Customer Reviews