Table of Contents for
Rapid Cybersecurity Ops

Version ebook / Retour

Cover image for bash Cookbook, 2nd Edition Rapid Cybersecurity Ops by Carl Albing Published by O'Reilly Media, Inc., 2019
  1. Cover
  2. nav
  3. Rapid Cybersecurity Ops
  4. Rapid Cybersecurity Ops
  5. 1. Command Line Primer
  6. 2. Bash Primer
  7. 3. Regular Expressions
  8. 4. Data Collection
  9. 5. Data Processing
  10. 6. Data Analysis
  11. 7. Real-Time Log Monitoring
  12. About the Authors
  1. 1. Command Line Primer
    1. Commands and Arguments
    2. Standard Input/Output/Error
    3. Redirection and Piping
    4. Running Commands in the Background
    5. From Command Line to Script
    6. Summary
    7. Exercises
  2. 2. Bash Primer
    1. Output
    2. Variables
      1. Positional Paramaters
    3. Input
    4. Conditionals
    5. Looping
    6. Functions
      1. Function Arguments
      2. Returning Values
    7. Pattern Matching in bash
    8. Writing Your First Script - Detecting Operating System Type
    9. Summary
    10. Exercises
  3. 3. Regular Expressions
    1. Commands in Use
      1. grep
      2. grep and egrep
    2. Regular Expression Metacharacters
      1. The “.” Metacharacter
      2. The “?” Metacharacter
      3. The “*” Metacharacter
      4. The “+” Metacharacter
      5. Grouping
      6. Brackets and Character Classes
      7. Back References
      8. Quantifiers
      9. Anchors and Word Boundaries
    3. Summary
    4. Exercises
  4. 4. Data Collection
    1. Commands in Use
      1. cut
      2. file
      3. head
      4. reg
      5. wevtutil
    2. Gathering System Information
      1. Executing a Command Remotely Using SSH
      2. Gathering Linux Log Files
      3. Gathering Windows Log Files
      4. Gathering System Information
      5. Gathering the Windows Registry
    3. Searching the File System
      1. Searching by Filename
      2. Searching for Hidden Files
      3. Searching by File Size
      4. Searching by Time
      5. Searching for Content
      6. Searching by File Type
      7. Searching by Message Digest Value
    4. Transferring Data
    5. Summary
    6. Exercises
  5. 5. Data Processing
    1. Commands in Use
      1. awk
      2. join
      3. sed
      4. tail
      5. tr
    2. Processing Delimited Files
      1. Iterating Through Delimited Data
      2. Processing by Character Position
    3. Processing XML
    4. Processing JSON
    5. Aggregating Data
    6. Summary
    7. Exercises
  6. 6. Data Analysis
    1. Commands in use
      1. sort
      2. uniq
    2. Sorting and Arranging Data
    3. Counting Occurrences in Data
    4. Totaling Numbers in Data
    5. Displaying Data in a Histogram
    6. Finding Uniqueness in Data
    7. Identifying Anomalies in Data
    8. Summary
    9. Exercises
  7. 7. Real-Time Log Monitoring
    1. Monitoring Text Logs
      1. Log-Based Intrusion Detection
    2. Monitoring Windows Logs
    3. Generating a Real-Time Histogram
    4. Summary
    5. Exercises
Back to top