... Penetration Testing with the Bash shell Make the most of the Bash shell and Kali Linux's command-line-based security assessment tools Keith Makan BIRMINGHAM - MUMBAI www.it-ebooks.info Penetration ... discussing the bash shell? Why is it so popular among system administrators, penetration testers, and developers? Well, there may be other reasons, but fundamentally the bash shell is the most ... Know Bash The which command The which command prints the canonical file path of the supplied argument Here, it appears in back-ticks so that the bash shell will substitute this command for the...