O'Reilly logo

Penetration Testing with Perl by Swizec Teller

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 2. Linux Terminal Output

The Bourne Again shell, or bash shell, provides us with a no-hassle, easy interface for utilizing Linux applications, the filesystem, network tasks, and much more. We can chain applications with data streams, fork them into the background, manipulate files, and even send the output across the network. What a lot of people don't know is that most shells, such as the bash shell, have their own programming logical conditional constructors and commands built directly into them. Throughout this book, we will be combining Perl with the Linux operating system to create a great penetration testing asset, so it's good to know how well Perl can manipulate strings and that Linux treats everything as a file.

Another great ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required