Hacking

An introduction to Bash Scripting for automating some nmap recon

April 30, 2011 by Keatron Evans

This is a brief intro to automating recon through bash scripting. This example uses nmap scans that we’re automating.  We teach this and much more in our penetration testing and  ethical hacking courses. This is on the list of my ideal skill-sets for penetration testing – so you can get started learning it right here right now.

Posted: April 30, 2011
Articles Author
Keatron Evans
View Profile

Keatron Evans is regularly engaged in training, consulting, penetration testing and incident response for government, Fortune 50 and small businesses. In addition to being the lead author of the best-selling book, Chained Exploits: Advanced Hacking Attacks from Start to Finish, you will see Keatron on major news outlets such as CNN, Fox News and others on a regular basis as a featured analyst concerning cybersecurity events and issues. For years, Keatron has worked regularly as both an employee and consultant for several intelligence community organizations on breaches and offensive cybersecurity and attack development. Keatron also provides world-class training for the top training organizations in the industry, including Infosec Skills live boot camps and on-demand training.

4 responses to “An introduction to Bash Scripting for automating some nmap recon”

  1. nomail says:

    In the presentation of the http://ftp.sh script the final slide said “done” marks the end of the script. Actually, the BASH keyword ‘done’ marks the end of the preceding ‘for-loop’ and instructs the BASH interpreter to reiterate over the ‘for-loop’, in this case if the end of the file ‘ftp2’ has not been reached, otherwise the ‘for-loop’ finishes and the BASH interpreter jumps to the line in the script immediately following ‘done’.

  2. Thanks for that nomail!

  3. Tapiwa Shumba says:

    Mr Evans, I have had a profound interest in network security for a decade and even attempted to be qualified as a systems administrator at a college in Australia.

    I would appreciate your advice on how I can specialize in the field of Penetration testing as it has been my passion for a long time. I would like your recommedation on what would be the most effective pathway to develop a career in ethical penetration testing.

  4. Remarkable! Its truly awesome post, I have got much clear idea about from this piece of writing.

Leave a Reply

Your email address will not be published. Required fields are marked *