Product: 1849695105
The book begins out with a section dedicated to general Linux commands. It will make it easy for non-Linux users to work with Linux. It was not as useful for experienced Linux users, but the section on customizing your bash prompt and bash history is useful for both beginners and experienced Linux users. The crash course on regular expressions was excellent as well and is a skill anyone using Linux can make great use of. I strongly encourage readers to pay attention to regular expressions as they are a very useful tool.
I liked the ‘further reading sections at the end of each chapter’. It gives the reader a small road map to building up further skills.
In discussion on customizing the command history and keeping sensitive variables secure the author mentioned using TrueCrypt which should lkely be avoided given the announcement from the authors that truecrypt is not secure. I would recommend using GPG on a Linux system.
Chapters include:
- Getting to Know Bash
- Customizing Your Shell
- Network Reconnaissance
- Exploitation and Reverse Engineering
- Network Exploitation and Monitoring
Overall I think the book is a good introduction to the world of penetration testing and builds some command line skills that can be essential to the pen tester.
Rating: 4
1849695105
Count: 9
Review by Charles Profitt
on 2020-03-10