How to use BASH in Penetration Testing

You are here:

Luciano Ferrari

Speaker Luciano Ferrari,
Designation: Head Information Security for Americas at Infineon | Founder & CTO Lufsec
Topic: How to use BASH in Penetration Testing
Date of Webinar: 10th Sep, 2020
Time and Location: 10:00 am Phoenix Time/ 10:30 pm IST/ 01:00 pm EDT

Watch Now

Speaker Bio:
Luciano Ferrari is an information security leader and IoT hacking expert. Luciano holds multiple security certifications, including CISSP, CRISC, and PCIP, and has worked at Fortune 500 companies in both technical and leadership roles. He drives progress at his own company, LufSec, where he works on security-related issues and projects. Luciano has conducted hundreds of IT security audits and penetration tests, including audits and tests on IoT devices for cable companies. He has also leveraged his IT security expertise in manufacturing, semiconductor, financial, and educational institutions. With his background in electronics and microelectronics, his distinct specialization is definitely on hardware hacking. Luciano is passionate about sharing his knowledge with others and teaching. His other areas of expertise include IT infrastructure, networking, penetration testing, risk, vulnerability, and threat management. In private, he enjoys researching new technologies and participating at security conferences and in bug bounty programs

Topic Abstract:
After basic enumeration and exploitation with tools are learned. It is important to revisit scripting skills to strengthen the basics of Penetration Testing, therefore BASH. BASH is important to interpret shell commands. Shell scripting is to used to execute commands, which is very important in the exploitation and enumeration process.

Key Takeaways:

  1. Importance of BASH in penetration testing
  2. How to use BASH tools to parse text and generate effective outcomes.
  3. How to use packets to improve the efficiency of a Penetration Test

*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)

Share this Article
You may also like

Train with EC-Council

Cyber Talks
Recent Posts