Hi guys, we are back to the series of Cybersecurity Ops with Bash: Defensive workshop solution. Note: This is only workshop solution, NOT A SUMMARY OF DEFENSIVE BASH!!! I do not own the book, I am just reading/learning it and published the solution ONLY. Before you read the workshop solution, it is good if youContinue reading “Cybersecurity Ops with Bash: Defensive (Ch.9)”
Tag Archives: Bash Scripting
Cybersecurity Ops with Bash: Defensive (Ch. 8)
Hi guys, we are back to the series of Cybersecurity Ops with Bash: Defensive workshop solution. Note: This is only workshop solution, NOT A SUMMARY OF DEFENSIVE BASH!!! I do not own the book, I am just reading/learning it and published the solution ONLY. Before you read the workshop solution, it is good if youContinue reading “Cybersecurity Ops with Bash: Defensive (Ch. 8)”
Cybersecurity Ops with Bash: Defensive (Ch. 7)
Hi guys, we will be continuing the series of Cybersecurity Ops with Bash: Defensive workshop solution. I will be going through Chapter 7: Data Analysis. Note: This is only workshop solution, NOT A SUMMARY OF DEFENSIVE BASH!!!Note: I do not own the book, I am just reading/learning it and published the solution ONLY. Before youContinue reading “Cybersecurity Ops with Bash: Defensive (Ch. 7)”
Cybersecurity Ops with Bash: Defensive (Ch. 6)
Hi guys, we will be continuing the series of Cybersecurity Ops with Bash: Defensive workshop solution. I will be going through Chapter 6: Data Processing. Note: This is only workshop solution, NOT A SUMMARY OF DEFENSIVE BASH!!!Note: I do not own the book, I am just reading/learning it and published the solution ONLY. Before youContinue reading “Cybersecurity Ops with Bash: Defensive (Ch. 6)”
Cybersecurity Ops with Bash: Defensive(Ch. 5)
Hi guys, recently I have reading an ebook on O’reilly, the ebook is called Cybersecurity Ops with Bash. It teached us how to write bash script and show how bash script can be used in both offensive and defensive. I have the link below if you want to get the book from Amazon or O’reilly.Continue reading “Cybersecurity Ops with Bash: Defensive(Ch. 5)”