هر روز با یک کتاب
Penetration Testing with the Bash shell
سرفصل ها:
Chapter 1: Getting to Know Bash
Chapter 2: Customizing Your Shell
Chapter 3: Network Reconnaissance
Chapter 4: Exploitation and Reverse Engineering
Chapter 5: Network Exploitation and Monitoring