Index
A
- -amin n option / File testing options
- -atime n option / File testing options
- addressing modes, options
- -s MAC / Host discovery with Arping
- -S IP / Host discovery with Arping
- -t MAC / Host discovery with Arping
- -T IP / Host discovery with Arping
- aliases
- about / Aliases
- Arachni
- about / Scanning with Arachni
- used, for assessing automated web application / Scanning with Arachni
- ARP
- abusing / Abusing address resolution
- Arping
- about / Enumerating targets on the local network, Host discovery with Arping
- used, for performing host discovery / Host discovery with Arping
- ArpSpoof
- about / Abusing address resolution
- automated web application security assessment
- about / Automated web application security assessment
- SkipFish used / Scanning with SkipFish
- Arachni used / Scanning with Arachni
B
- .bashrc file / Aliases
- .bash_history file / Protecting sensitive information from leakage
- bash hacks
- and msfcli / Bash hacks and msfcli
- and SSLyze / Bash hacks and SSLyze
- bash terminal
- about / Formatting the terminal output
- binaries
- disassembling / Disassembling binaries
- disassembling, with Objdump / Disassembling with Objdump
- debugging, for dynamic analysis / Debugging binaries for dynamic analysis
- running, in GDB / Getting started with GDB
- execution breakpoints, setting / Setting execution breakpoints and watch points
- watch points, setting / Setting execution breakpoints and watch points
- registers, inspecting / Inspecting registers, memory values, and runtime information
- memory values, inspecting / Inspecting registers, memory values, and runtime information
- runtime information, inspecting / Inspecting registers, memory values, and runtime information
- Brute-forcing authentication
- about / Brute-forcing authentication
- Medusa used / Using Medusa
C
- -c COUNT option / Host discovery with Arping
- -c CSV-RESULTS-FILE option / Using dnsmap
- cd command / Navigating and searching the filesystem
- Cipher Block Chaining (CBC) / Using SSLyze
- CISC
- command history
- customizing / Customizing the command history
- sensitive information, protecting from leakage / Protecting sensitive information from leakage
- control characters, regular expressions
- ^ / Regular expression language – a crash course
- $ / Regular expression language – a crash course
- [] / Regular expression language – a crash course
- () / Regular expression language – a crash course
- | / Regular expression language – a crash course
- ? / Regular expression language – a crash course
- + / Regular expression language – a crash course
- {n} / Regular expression language – a crash course
- {n,m} / Regular expression language – a crash course
- control sequences
- customization, command history / Customizing the command history
- customization, tabcompletion / Customizing tab completion
- customizations, prompt string / Prompt string customizations
D
- -daystart option / Directory traversal options
- -delete option / File action options
- -d option / Host discovery with Arping
- Dig
- directories
- navigating / Navigating directories
- directory contents
- listing / Listing directory contents
- directory traversal options, find command
- -maxdepth n / Directory traversal options
- -mindepth n / Directory traversal options
- -daystart / Directory traversal options
- -mount / Directory traversal options
- dnsenum
- about / Using dnsmap
- DNS interrogation
- performing, Dig used / Using Dig
- performing, dnsmap used / Using dnsmap
- dnsmap
- about / Using dnsmap
- used, for performing DNS interrogation / Using dnsmap
- dnsmap options
- -w WORDLIST / Using dnsmap
- -r RESULTS-FILE / Using dnsmap
- -c CSV-RESULTS-FILE / Using dnsmap
- -i IP-IGNORE-LIST / Using dnsmap
- DNS servers
- about / Interrogating the DNS servers
- interrogating / Interrogating the DNS servers
- DNS spoofing attack
- setting up, with Ettercap / Ettercap DNS spoofing
- dynamic analysis
- binaries, debugging for / Debugging binaries for dynamic analysis
E
- -execdir option / File action options
- -exec option / File action options
- -executable | -readable | -writable option / File testing options
- echo command
- about / File selection options
- ELF / Disassembling with Objdump
- environment variables, command history
- HISTSIZE / Customizing the command history
- HISTFILE / Customizing the command history
- HISTFILEZIE / Customizing the command history
- HISTCONTROL / Customizing the command history
- ERE
- Ettercap
- about / Ettercap DNS spoofing
- DNS spoofing attack, setting up with / Ettercap DNS spoofing
- eval command / Inspecting registers, memory values, and runtime information
- execution breakpoints
F
- file action options, find command
- -delete / File action options
- -exec / File action options
- -execdir / File action options
- -print0 / File action options
- -ls / File action options
- file descriptors
- about / Redirecting output
- file selection options
- about / File selection options
- -a or --text / File selection options
- --binary-files=TYPE / File selection options
- -D ACTION or --devices=ACTION / File selection options
- --exclude=GLOB / File selection options
- -R, -r, or --recursive / File selection options
- filesystem
- navigating / Navigating and searching the filesystem
- searching / Navigating and searching the filesystem, Searching the filesystem
- file testing options
- about / File testing options
- -amin n / File testing options
- -atime n / File testing options
- -mmin n / File testing options
- -mtime n / File testing options
- -executable | -readable | -writable / File testing options
- -perm / File testing options
- -mode / File testing options
- -iname nAmE / File testing options
- -regex pattern / File testing options
- Find command / Navigating and searching the filesystem
- find command
- about / Searching the filesystem
- Fping
G
- GDB
- about / Debugging binaries for dynamic analysis
- binaries, running in / Getting started with GDB
- grep utility
- about / Conventions, Getting to know grep
H
- help function / Inspecting registers, memory values, and runtime information
- HISTCONTROL environment variable / Customizing the command history
- HISTFILE environment variable / Customizing the command history
- HISTFILEZIE environment variable / Customizing the command history
- HISTSIZE environment variable / Customizing the command history
- host discovery
- performing, Arping used / Host discovery with Arping
- host discovery options
- Hping
I
- -i IP-IGNORE-LIST option / Using dnsmap
- -iname nAmE option / File testing options
- -i option / Host discovery with Arping
- I/O redirection
- about / Using I/O redirection
- using / Using I/O redirection
- output, redirecting / Redirecting output
- input, redirecting / Redirecting input
- ifconfig commands
- about / Spoofing MAC addresses
- invocation modes
- using, with msfcli / Using invocation modes with msfcli
- invocation options, ls command
- -a --all / Listing directory contents
- -d -directory / Listing directory contents
- -h / Listing directory contents
- -i / Listing directory contents
- -l / Listing directory contents
- -R --recursive / Listing directory contents
- -S / Listing directory contents
- -x / Listing directory contents
K
- Kali Linux
- about / Abusing address resolution
L
- -ls option / File action options
- local network
- targets, enumerating on / Enumerating targets on the local network
- ls command / Navigating and searching the filesystem, Listing directory contents
- invocation options / Listing directory contents
M
- -maxdepth n option / Directory traversal options
- -mindepth n option / Directory traversal options
- -mmin n option / File testing options
- -mode option / File testing options
- -mount option / Directory traversal options
- -mtime n option / File testing options
- MAC
- about / MAC and ARP abuse
- MAC addresses
- spoofing / Spoofing MAC addresses
- macchanger tool / Spoofing MAC addresses
- MAC spoofing attack
- about / MAC and ARP abuse
- man files
- about / Getting help from the man pages
- man pages
- help, obtaining from / Getting help from the man pages
- matcher selection options, regular expression
- -E or --extended-regexp / Regular expression matcher selection options
- -F or --fixed-strings / Regular expression matcher selection options
- -P or --perl-regexp / Regular expression matcher selection options
- matching control options, regular expression
- -e PATTERN or --regexp=PATTERN / Regular expression matching control options
- -f or --file=FILE / Regular expression matching control options
- -v or --invert-match / Regular expression matching control options
- -w or --word-regexp / Regular expression matching control options
- -x or --line-regexp / Regular expression matching control options
- Medusa
- about / Using Medusa
- memory values
- Metasploit
- about / Using the Metasploit command-line interface
- payloads, preparing with / Preparing payloads with Metasploit
- Meterpreter
- MITM attacks
- about / Man-in-the-middle attacks
- Ettercap DNS spoofing / Ettercap DNS spoofing
- msfcli
- using / Using the Metasploit command-line interface
- usage specification / Getting started with msfcli
- [MODULE] option / Getting started with msfcli
- [OPTIONS] option / Getting started with msfcli
- [MODE] option / Getting started with msfcli
- invocation modes, using with / Using invocation modes with msfcli
- and bash hacks / Bash hacks and msfcli
- msfpayload command / Creating and deploying a payload
N
- Nmap
- about / Target enumeration with Nmap
- targets, enumerating with / Target enumeration with Nmap
O
- Objdump
- used, for disassembling binaries / Disassembling with Objdump
- options, Arping
- options, ArpSpoof
- options, cd command
- options, find command
- options, Nmap
- -PS TCP SYN flag scan / Target enumeration with Nmap
- -PA TCP ACK flag scan / Target enumeration with Nmap
- -PO IP protocol ping / Target enumeration with Nmap
- options, smtp-user-enum tool
- options, TCPDump
- output control options
- about / Output control options
- -c or --count / Output control options
- -L or --files-without-match / Output control options
- -l or --files-with-matches / Output control options
- -m or -max-count=NUM / Output control options
- -o or -only-matching / Output control options
P
- -PA TCP ACK flag scan option
- about / Target enumeration with Nmap
- -PE option / Target enumeration with Nmap
- -perm option / File testing options
- -PO IP protocol ping option
- about / Target enumeration with Nmap
- -p option / Host discovery with Arping
- -PP option / Target enumeration with Nmap
- -print0 option / File action options
- -PS TCP SYN flag scan option
- about / Target enumeration with Nmap
- packet filter, TCPDump
- using / Using the TCPDump packet filter
- payloads
- preparing, with Metasploit / Preparing payloads with Metasploit
- creating / Creating and deploying a payload
- deploying / Creating and deploying a payload
- pipes
- using / Using pipes
- POSIX
- prompt string
- about / The prompt string
- customizing / Prompt string customizations
- pwd command / Navigating and searching the filesystem, Navigating directories
R
- -regex option
- usage, examples / File testing options
- -regex pattern option / File testing options
- -r option / Host discovery with Arping
- -r RESULTS-FILE option / Using dnsmap
- record types, dig
- registers
- regular expression language
- regular expressions
- about / File testing options, Regular expression language – a crash course
- control characters / Regular expression language – a crash course
- matcher selection options / Regular expression matcher selection options
- matching control options / Regular expression matching control options
- reverse engineering assembler code
- RISC
- runtime information
S
- -S IP option / Host discovery with Arping
- -s MAC option / Host discovery with Arping
- sections, man files
- name / Getting help from the man pages
- synopsis / Getting help from the man pages
- description / Getting help from the man pages
- examples / Getting help from the man pages
- see also / Getting help from the man pages
- sections, man pages
- general commands / Getting help from the man pages
- system calls / Getting help from the man pages
- C library functions / Getting help from the man pages
- special files / Getting help from the man pages
- file formats and conventions / Getting help from the man pages
- games / Getting help from the man pages
- screensavers / Getting help from the man pages
- miscellanea / Getting help from the man pages
- system administration commands / Getting help from the man pages
- daemons / Getting help from the man pages
- servers
- interrogating / Interrogating servers
- servers interrogation
- about / Interrogating servers
- SNMP / SNMP interrogation
- SMTP / SMTP server interrogation
- shorthands
- about / Formatting the terminal output
- shorthands, supported by grep
- [*alnum*] / Regular expression language – a crash course
- [*alpha*] / Regular expression language – a crash course
- [*digit*] / Regular expression language – a crash course
- [*punt*] / Regular expression language – a crash course
- SkipFish
- about / Scanning with SkipFish
- launching / Scanning with SkipFish
- used, for assessing automated web application / Scanning with SkipFish
- smtp-user-enum tool
- about / SMTP server interrogation
- SMTP server interrogation
- about / SMTP server interrogation
- SNMP
- about / SNMP interrogation
- snmp-login module / SNMP interrogation
- SNMP interrogation
- about / SNMP interrogation
- SNMP Security
- about / SNMP interrogation
- snmp_enum script / SNMP interrogation
- snmp_login module / SNMP interrogation
- snmp_login script / SNMP interrogation
- SSL implementation security assessment
- about / Assessing SSL implementation security
- SSLyze used / Using SSLyze
- SSLyze
- about / Using SSLyze
- used, for assessing SSL implementation security / Using SSLyze
- and bash hacks / Bash hacks and SSLyze
- switch
- about / Listing directory contents
- symbolic links
- about / Navigating directories
T
- -T IP option / Host discovery with Arping
- -t MAC option / Host discovery with Arping
- tabcompletion
- customizing / Customizing tab completion
- targets
- enumerating, on local network / Enumerating targets on the local network
- enumerating, with Nmap / Target enumeration with Nmap
- TCPDump
- about / Traffic filtering with TCPDump
- used, for filtering traffic / Traffic filtering with TCPDump, Getting started with TCPDump
- packet filter, using / Using the TCPDump packet filter
- terminal output
- formatting / Formatting the terminal output
- traffic filtering
- with TCPDump / Traffic filtering with TCPDump, Getting started with TCPDump
W
- -w WORDLIST option / Using dnsmap
- watch points
- which command
- about / File selection options
- Whois
- about / Interrogating the Whois servers
- functionality / Interrogating the Whois servers
- whois record
- about / Interrogating the Whois servers
- Whois servers
- about / Interrogating the Whois servers
- interrogating / Interrogating the Whois servers
- whois tool
- about / Interrogating the Whois servers