By Π’ΡΠΎΠ½ΠΊΠΎΠ½ ΠΠΎΠ», ΠΠ»Π±ΠΈΠ½Π³ ΠΠ°ΡΠ»
ΠΠΎΠ» Π’ΡΠΎΠ½ΠΊΠΎΠ½, ΠΠ°ΡΠ» ΠΠ»Π±ΠΈΠ½Π³, 2025
ΠΠΎΠΌΠ°Π½Π΄Π½Π°Ρ ΡΡΡΠΎΠΊΠ° Linux ΠΏΡΠ΅Π΄ΡΡΠ°Π²Π»ΡΠ΅Ρ ΡΠΎΠ±ΠΎΠΉ ΠΌΠΎΡΠ½ΡΠΉ ΠΈΠ½ΡΡΡΡΠΌΠ΅Π½Ρ Π΄Π»Ρ ΠΎΠ±Π΅ΡΠΏΠ΅ΡΠ΅Π½ΠΈΡ ΠΊΠΈΠ±Π΅ΡΠ±Π΅Π·ΠΎΠΏΠ°ΡΠ½ΠΎΡΡΠΈ Π±Π»Π°Π³ΠΎΠ΄Π°ΡΡ ΡΠ²ΠΎΠ΅ΠΉ Π³ΠΈΠ±ΠΊΠΎΡΡΠΈ ΠΈ Π΄ΠΎΡΡΡΠΏΠ½ΠΎΡΡΠΈ. ΠΡΠ° ΠΊΠ½ΠΈΠ³Π° ΡΠ°ΡΠΊΡΡΠ²Π°Π΅Ρ, ΠΊΠ°ΠΊ ΠΈΡΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°ΡΡ ΡΡΠ°Π½Π΄Π°ΡΡΠ½ΡΠΉ ΠΈΠ½ΡΠ΅ΡΡΠ΅ΠΉΡ ΠΊΠΎΠΌΠ°Π½Π΄Π½ΠΎΠΉ ΡΡΡΠΎΠΊΠΈ (CLI) Π΄Π»Ρ Π·Π°ΡΠΈΡΡ ΠΈ Π°Π½Π°Π»ΠΈΠ·Π°. ΠΠ²ΡΠΎΡΡ ΠΠΎΠ» Π’ΡΠΎΠ½ΠΊΠΎΠ½ ΠΈ ΠΠ°ΡΠ» ΠΠ»Π±ΠΈΠ½Π³ Π΄Π΅Π»ΡΡΡΡ ΠΌΠ΅ΡΠΎΠ΄Π°ΠΌΠΈ ΡΠ±ΠΎΡΠ° Π΄Π°Π½Π½ΡΡ Π΄Π»Ρ ΡΠΏΡΠ΅ΠΆΠ΄Π°ΡΡΠ΅ΠΉ Π·Π°ΡΠΈΡΡ, Π°Π½Π°Π»ΠΈΠ·Π° ΠΆΡΡΠ½Π°Π»ΠΎΠ² ΠΈ ΠΌΠΎΠ½ΠΈΡΠΎΡΠΈΠ½Π³Π° ΡΠ΅ΡΠ΅ΠΉ. ΠΠ΅Π½ΡΠ΅ΡΡΠ΅ΡΡ Π½Π°ΠΉΠ΄ΡΡ ΡΠ΅Π½Π½ΡΠ΅ ΡΠ²Π΅Π΄Π΅Π½ΠΈΡ ΠΎ ΠΏΡΠΎΠ²Π΅Π΄Π΅Π½ΠΈΠΈ Π°ΡΠ°ΠΊ Ρ ΠΈΡΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°Π½ΠΈΠ΅ΠΌ ΠΎΠ±ΡΠΈΡΠ½ΡΡ Π²ΠΎΠ·ΠΌΠΎΠΆΠ½ΠΎΡΡΠ΅ΠΉ Linux.
Paul Troncon, Carl Olbing, 2025
The Linux command line serves as an ideal tool for cybersecurity due to its flexibility and accessibility. This book explores how to leverage the standard Command Line Interface (CLI) for defense and analysis. Authors Paul Troncon and Carl Olbing detail methods for data collection in proactive defense, log analysis, and network monitoring. Penetration testers will discover techniques for conducting attacks using the extensive capabilities built into most Linux versions.