Chapter 23. Conclusion

As you have seen throughout this book, the command line and its associated scripting capabilities and tools are an invaluable resource for the cybersecurity operator. It can be compared to an infinitely reconfigurable multitool. By piping together a thoughtful series of commands, you can create a single-line script that performs extremely complex functions. For even more functionality, you can create multiline scripts.

The next time you are faced with an operational challenge, try to solve it by using the command line and bash before you reach for a premade tool. Over time you will develop your skills and one day be able to dazzle others with your command-line wizardry.

We encourage you to contact us at the Cybersecurity Ops website with questions and examples of scripts you have created that have made your operations more productive.

Happy scripting!

echo 'Paul and Carl' | sha1sum | cut -c2,4,11,16
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset