It began with the forging of the command line. And some things that should not have been forgotten, were lost. History became legend, legend became myth.
Sometimes you just need to pull out the third column of a CSV file. Sometimes you just need to sort IP addresses. Sometimes you have to pull out IP addresses from the third column and sort them, but only if the first column is a particular string and for some reason the case is random.
In this DEF CON 101 talk, we'll cover a ton of bash one-liners that we use to speed up our hacking. Along the way, we'll talk about the concepts behind each of them and how we apply various strategies to accomplish whatever weird data processing task comes up while testing exploits and attacking a network.
egypt is a penetration tester for Black Hills Information Security and a contributor to the Metasploit Project. He is not a country. @egyp7
William Vu is a security researcher at Rapid7 who works on the Metasploit Project.