Summary
This chapter explored the topic of using Bash scripting for network pentesting and automation. Port scanning was thoroughly explored, from basic command-line options through advanced techniques necessary to tune for speed and depth of results. We went through the discovery of common network protocols that are frequently exploited. Finally, we dived into the automation of network vulnerability scanning tools.
The next chapter will focus on post-exploitation privilege escalation techniques in a Bash environment. When remote network services are exploited, they commonly result in a non-root shell. In Chapter 11, we will dive in and explore how to enumerate Linux systems in a Bash shell to escalate our privileges for a complete system takeover.