Sponsored Content
Top Forums UNIX for Beginners Questions & Answers Beginning my programming/scripting path Post 303041505 by orkhan on Tuesday 26th of November 2019 08:00:26 AM
Old 11-26-2019
@Neo

I am working with NGFW, Web Application Firewall, Web Security Appliance, Email Security Appliance, NAC taking into consideration only security devices.

I think to have ideas what will i do in future regarding cybersecurity and what I am asking right now are different things. I am just asking that I want to harden my shell scripting skills and wonder if there any sites where I can find sample tasks for working on them and learning.
 

10 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

Beginning for shell programming and scripting

I just did a quick search for 'script' and browsed the Shell Programming and Scripting Q & A category, but didn't spot a thread that might help me. I'm wanting to get into shell programming and scripting (including automating a lot of manual processes, i.e. renaming files, replacing characters... (4 Replies)
Discussion started by: HLee1981
4 Replies

2. Shell Programming and Scripting

Shell Programming and Scripting

Hi, iam having the file as follows: ABCDEFGH|0987654321234567 ABCDEFGH|0987654321234523 ABCDEFGH|0987654321234556 ABCDEFGH|0987654321234545 POIUYTRE|1234567890890678 POIUYTRE|1209867757352567 POIUYTRE|5463879088797131 POIUYTRE|5468980091344456 pls provide me the split command ... (14 Replies)
Discussion started by: nivas
14 Replies

3. Shell Programming and Scripting

Shell Programming and Scripting

I want to compare some files. say iam having 2 sets of files ,each is having some 10 files. ie, file1 1a.txt 1b.txt 1c.txt ... file2 2a.txt 2b.txt 2c.txt ... i need to read line by line of this files parralley.. ie.. i want to read file1 first line that is 1a.txt and file2... (2 Replies)
Discussion started by: nivas
2 Replies

4. Shell Programming and Scripting

Shell Programming and Scripting

Hi, Iam having file1 as follows: ERTYUIOU|1234567689089767688 FDHJHKJH|6817738971783893499 JFKDKLLUI|9080986766433498444 FILE2 ERTYUIOU|1234567689089767688 resh@abc_com 767637218328322332 893589893499 asdsddssd ... (21 Replies)
Discussion started by: nivas
21 Replies

5. Infrastructure Monitoring

Shell Programming and Scripting

# set date to your spec: this is month/day/yr/hr/min/sec: sysdate=`date '+%m/%d/%Y-%H:%M:%S'` # get the last line before the history file is modified tail -1 /tmp/hosthistory.txt |while read lastdate mydevices do echo $lastdate echo $mydevices done LIST = 'ypcat hosts|| sort... (11 Replies)
Discussion started by: lemseffert
11 Replies

6. Shell Programming and Scripting

Shell Programming and Scripting

Hi All, How do I code a password with multiple special characters in it. Example: password is P#utar&@ None of the belwo options worked 1. passwd="P#utar&@" 2. passwd='P#utar&@' Any help will be greatly appreciated. (3 Replies)
Discussion started by: afredri
3 Replies

7. Shell Programming and Scripting

shell scripting and programming

RCS file: /home/rcap/.APCVS/regs/rc/power/analysis/pow_rtl/renes_setup.g,v Working file: ./power/analysis/pow_rtl/renes_setup.g head: 1.14 branch: locks: strict access list: symbolic names: br_2010_101_200: 1.13.0.12 br_2010_101_100: 1.13.0.10 br_2009_91_200:... (3 Replies)
Discussion started by: harjinder
3 Replies

8. Shell Programming and Scripting

shell programming and scripting

I was trying out some new series to get it print 1 1 2 1 2 3 1 2 3 4 1 2 3 4 5 and the seond one is 1 2 2 3 3 3 4 4 4 4 5 5 5 5 5 but was unable to get the result. (5 Replies)
Discussion started by: harjinder
5 Replies

9. Shell Programming and Scripting

shell programming and scripting

hi, i am trying this while loop and i only want that it should only read food as pizza....no other entry should be taken here. #!/usr/bin/perl -w $food = " "; while ( $food ne 'pizza' ) { print 'enter what you had last night: '; chomp ($food = <STDIN>); #print $food ; } ... (2 Replies)
Discussion started by: kullu
2 Replies

10. UNIX for Beginners Questions & Answers

How to use sed to insert character in the beginning of file path?

I need to manipulate one Database file on Solaris 11 in which contains more than 5000 lines of data file path like this: '/data1/oradata/DBNAME/system01.dbf', '/data7/oradata/DBNAME/undotbs1_01.dbf', '/data1/oradata/DBNAME/sysaux01.dbf', '/data28/oradata/DBNAME/userdata01.dbf', ... (6 Replies)
Discussion started by: duke0001
6 Replies
SPIKEPROXY(1)						      General Commands Manual						     SPIKEPROXY(1)

NAME
spikeproxy - web application auditing tool SYNOPSIS
spkproxy [-s SSLproxyhost] [-p port] [-U NTLMUser] [-D NTLMDomain] [-P NTLMPassword] [-l ListenHost] [-c cache_directory] DESCRIPTION
This manual page documents briefly the spikeproxy command. This manual page was written for the Debian distribution because the original program does not have a manual page. SPIKE proXY functions as an HTTP and HTTPS proxy, and allows web developers or web application auditors low level access to the entire web application interface, while also providing a number of automated tools and techniques for discovering common problems. These automated tools include: 1.Automated SQL Injection Detection 2.Web Site Crawling (guaranteed not to crawl sites other than the one being tested) 3.Login form brute forcing 4.Automated overflow detection 5.Automated directory traversal detection In addition to automated analysis, SPIKE proXy allows the user to penetrate into the internals of the web application by viewing and chang- ing all variables, cookies, headers, or other parts of the request and resubmit them. SPIKE proXy maintains a careful record of each request made - saving both each request, and the entire response. The user can later go back and replace any request or view any response. OPTIONS
This program can be configured with the options listed below. The options may be given in any order. -c cache directory The directory that will be used to cache all the requests. This directory is created if it does not exist. The default location is /var/cache/spikeproxy but it can only be used by the root user. -l listenhost The IP address the proxy will listen on (it defaults to 127.0.0.1 so it is not available from external hosts). -p port This option sets the port the proxy will listen on (it defaults to 8080 if not provided). -h proxyHost Sets a proxy host to use in the proxy chain. Spike will forward all requests to this proxy. -H proxyPort Sets the port for the proxy host. -s proxySSLHost Sets a proxy host for SSL connections. Spike will forward all SSL requests to this proxy. -S proxySSLPort Sets the port for the SSL proxy host. -U NTLM Username Defines the NTLM username it will use when authenticating to the proxy host. -P NTLM Password Sets the password it will use when authenticating to the proxy host. -D NTLM Domain Sets the NTLM domain it will use when providing credentials to the proxy host. SEE ALSO
The program provides inline documentation in the user interface when connected to it through a web client. If you are trying to audit a web application you might want to read OWASP Guide to Building Secure Web Applications and Web Services, Application Security Attack Components project, Application Security Testing Framework, and the OWASP Web Application Security TopTen available at http://www.owasp.org and the World Wide Web Security FAQ available at http://www.w3.org/Security/Faq/ AUTHOR
This manual page was written by Javier Fernandez-Sanguino Pen~a <jfs@computer.org>, for the Debian GNU/Linux system (but may be used by others). October 2, 2006 SPIKEPROXY(1)
All times are GMT -4. The time now is 06:48 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy