-
Book Overview & Buying
-
Table Of Contents
Penetration Testing with the Bash shell
By :
Penetration Testing with the Bash shell
By:
Overview of this book
Table of Contents (13 chapters)
Penetration Testing with the Bash shell
Credits
Disclaimer
About the Author
About the Reviewers
www.PacktPub.com
Preface
Getting to Know Bash
Customizing Your Shell
Network Reconnaissance
Exploitation and Reverse Engineering
Network Exploitation and Monitoring
Index