Table of Contents for
Rapid Cybersecurity Ops
Close
Version ebook
/
Retour
Rapid Cybersecurity Ops
by Carl Albing
Published by O'Reilly Media, Inc., 2019
Cover
nav
Rapid Cybersecurity Ops
Rapid Cybersecurity Ops
1. Command Line Primer
2. Bash Primer
3. Regular Expressions
4. Data Collection
5. Data Processing
6. Data Analysis
7. Real-Time Log Monitoring
About the Authors
1. Command Line Primer
Commands and Arguments
Standard Input/Output/Error
Redirection and Piping
Running Commands in the Background
From Command Line to Script
Summary
Exercises
2. Bash Primer
Output
Variables
Positional Paramaters
Input
Conditionals
Looping
Functions
Function Arguments
Returning Values
Pattern Matching in bash
Writing Your First Script - Detecting Operating System Type
Summary
Exercises
3. Regular Expressions
Commands in Use
grep
grep and egrep
Regular Expression Metacharacters
The “.” Metacharacter
The “?” Metacharacter
The “*” Metacharacter
The “+” Metacharacter
Grouping
Brackets and Character Classes
Back References
Quantifiers
Anchors and Word Boundaries
Summary
Exercises
4. Data Collection
Commands in Use
cut
file
head
reg
wevtutil
Gathering System Information
Executing a Command Remotely Using SSH
Gathering Linux Log Files
Gathering Windows Log Files
Gathering System Information
Gathering the Windows Registry
Searching the File System
Searching by Filename
Searching for Hidden Files
Searching by File Size
Searching by Time
Searching for Content
Searching by File Type
Searching by Message Digest Value
Transferring Data
Summary
Exercises
5. Data Processing
Commands in Use
awk
join
sed
tail
tr
Processing Delimited Files
Iterating Through Delimited Data
Processing by Character Position
Processing XML
Processing JSON
Aggregating Data
Summary
Exercises
6. Data Analysis
Commands in use
sort
uniq
Sorting and Arranging Data
Counting Occurrences in Data
Totaling Numbers in Data
Displaying Data in a Histogram
Finding Uniqueness in Data
Identifying Anomalies in Data
Summary
Exercises
7. Real-Time Log Monitoring
Monitoring Text Logs
Log-Based Intrusion Detection
Monitoring Windows Logs
Generating a Real-Time Histogram
Summary
Exercises