{"id":1157,"date":"2023-12-18T19:05:15","date_gmt":"2023-12-18T18:05:15","guid":{"rendered":"https:\/\/s3curity.info\/wp\/?p=1157"},"modified":"2024-03-08T17:58:00","modified_gmt":"2024-03-08T16:58:00","slug":"apprenez-le-scripting-avec-bash","status":"publish","type":"post","link":"https:\/\/s3curity.info\/wp\/apprenez-le-scripting-avec-bash\/","title":{"rendered":"Apprenez le Scripting avec Bash"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Que-es-Bash-Script-1024x576.jpg\" alt=\"\" class=\"wp-image-1158\" style=\"width:1024px;height:auto\" srcset=\"https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Que-es-Bash-Script-1024x576.jpg 1024w, https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Que-es-Bash-Script-300x169.jpg 300w, https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Que-es-Bash-Script-768x432.jpg 768w, https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Que-es-Bash-Script.jpg 1366w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading has-text-align-center\">Qu&rsquo;est-ce que le Bash ?<\/h3>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Introduction au Bash :<\/strong><\/h4>\n\n\n\n<p><strong>Bash<\/strong>, acronyme de <strong>B<\/strong>ourne <strong>A<\/strong>gain <strong>SH<\/strong>ell, est un interpr\u00e9teur de commandes ou shell d\u00e9velopp\u00e9 pour les syst\u00e8mes Unix et Linux. Il s&rsquo;agit d&rsquo;un descendant du shell Bourne (<em>sh<\/em>) et est devenu le shell par d\u00e9faut sur de nombreux syst\u00e8mes Unix.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Caract\u00e9ristiques principales :<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Interface en Ligne de Commande (CLI) :<\/strong> Bash fournit une interface en ligne de commande o\u00f9 l&rsquo;utilisateur peut interagir avec le syst\u00e8me d&rsquo;exploitation en entrant des commandes textuelles.<\/li>\n\n\n\n<li><strong>Scripting :<\/strong> En plus d&rsquo;\u00eatre un shell interactif, Bash est un langage de script puissant. Les scripts Bash sont des fichiers texte contenant une s\u00e9quence de commandes que Bash ex\u00e9cute en s\u00e9quence.<\/li>\n\n\n\n<li><strong>Variables et Expressions :<\/strong> Bash prend en charge les variables, les expressions math\u00e9matiques, et offre une gestion flexible des cha\u00eenes de caract\u00e8res.<\/li>\n\n\n\n<li><strong>Redirection et Tubes :<\/strong> Il permet la redirection de l&rsquo;entr\u00e9e\/sortie standard et l&rsquo;utilisation de tubes (pipes) pour cha\u00eener plusieurs commandes.<\/li>\n<\/ul>\n\n\n\n<!--more-->\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Utilisation :<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Automatisation des T\u00e2ches :<\/strong> Les scripts Bash sont souvent utilis\u00e9s pour automatiser des t\u00e2ches r\u00e9p\u00e9titives ou complexes, am\u00e9liorant ainsi l&rsquo;efficacit\u00e9 du syst\u00e8me et des op\u00e9rations.<\/li>\n\n\n\n<li><strong>Administration Syst\u00e8me :<\/strong> Bash est largement utilis\u00e9 pour la gestion et l&rsquo;administration des syst\u00e8mes Unix et Linux.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center\">Scripting Bash<\/h3>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Introduction au Scripting Bash :<\/strong><\/h4>\n\n\n\n<p>Le scripting Bash consiste \u00e0 \u00e9crire des scripts, c&rsquo;est-\u00e0-dire des fichiers contenant des commandes Bash, pour automatiser des t\u00e2ches. Les scripts Bash sont des programmes ex\u00e9cutables qui utilisent la syntaxe du shell Bash.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Concepts Cl\u00e9s :<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Variables :<\/strong> Les variables en Bash sont utilis\u00e9es pour stocker des donn\u00e9es et peuvent \u00eatre r\u00e9f\u00e9renc\u00e9es ou modifi\u00e9es dans les scripts.<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"604\" height=\"77\" src=\"https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-190228.png\" alt=\"\" class=\"wp-image-1159\" srcset=\"https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-190228.png 604w, https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-190228-300x38.png 300w\" sizes=\"auto, (max-width: 604px) 100vw, 604px\" \/><\/figure>\n<\/div>\n\n\n<p><strong>Commandes Conditionnelles :<\/strong> Les structures <code>if<\/code>, <code>else<\/code>, et <code>elif<\/code> permettent d&rsquo;ex\u00e9cuter des blocs de code en fonction de conditions.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"599\" height=\"145\" src=\"https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-190317.png\" alt=\"\" class=\"wp-image-1160\" srcset=\"https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-190317.png 599w, https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-190317-300x73.png 300w\" sizes=\"auto, (max-width: 599px) 100vw, 599px\" \/><\/figure>\n<\/div>\n\n\n<p><strong>Boucles :<\/strong> Les boucles <code>for<\/code> et <code>while<\/code> permettent d&rsquo;it\u00e9rer sur des ensembles de donn\u00e9es ou d&rsquo;ex\u00e9cuter du code tant qu&rsquo;une condition est vraie.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"605\" height=\"100\" src=\"https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-190343.png\" alt=\"\" class=\"wp-image-1161\" srcset=\"https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-190343.png 605w, https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-190343-300x50.png 300w\" sizes=\"auto, (max-width: 605px) 100vw, 605px\" \/><\/figure>\n<\/div>\n\n\n<p>Expliquons la structure de la boucle <code>for ((i=1; i&lt;=10; i++))<\/code> en d\u00e9tail<\/p>\n\n\n\n<p>La structure de la boucle <code>for<\/code> en Bash suit le format g\u00e9n\u00e9ral :<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"606\" height=\"100\" src=\"https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-203318.png\" alt=\"\" class=\"wp-image-1184\" style=\"width:606px;height:auto\" srcset=\"https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-203318.png 606w, https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-203318-300x50.png 300w\" sizes=\"auto, (max-width: 606px) 100vw, 606px\" \/><\/figure>\n<\/div>\n\n\n<ul class=\"wp-block-list\">\n<li><strong><code>initialisation<\/code> :<\/strong> Cette partie initialise une variable (dans cet exemple, <code>i<\/code>) \u00e0 une valeur sp\u00e9cifique. C&rsquo;est le point de d\u00e9part de la boucle.<\/li>\n\n\n\n<li><strong><code>condition<\/code> :<\/strong> C&rsquo;est la condition qui doit \u00eatre vraie pour que la boucle continue \u00e0 s&rsquo;ex\u00e9cuter. Tant que cette condition est vraie, la boucle continue.<\/li>\n\n\n\n<li><strong><code>it\u00e9ration<\/code> :<\/strong> C&rsquo;est l&rsquo;op\u00e9ration qui est effectu\u00e9e \u00e0 chaque it\u00e9ration de la boucle. Dans cet exemple, <code>i++<\/code> signifie que la variable <code>i<\/code> sera incr\u00e9ment\u00e9e \u00e0 chaque it\u00e9ration.<\/li>\n<\/ul>\n\n\n\n<p>Voyons un exemple pratique :<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"605\" height=\"99\" src=\"https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-203407.png\" alt=\"\" class=\"wp-image-1185\" srcset=\"https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-203407.png 605w, https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-203407-300x49.png 300w\" sizes=\"auto, (max-width: 605px) 100vw, 605px\" \/><\/figure>\n<\/div>\n\n\n<p>Dans cet exemple, la boucle commence avec <code>i<\/code> \u00e9gal \u00e0 1. Tant que <code>i<\/code> est inf\u00e9rieur ou \u00e9gal \u00e0 5, le bloc de code \u00e0 l&rsquo;int\u00e9rieur de la boucle est ex\u00e9cut\u00e9. \u00c0 chaque it\u00e9ration, le message \u00ab\u00a0C&rsquo;est l&rsquo;it\u00e9ration num\u00e9ro $i\u00a0\u00bb est affich\u00e9, et la variable <code>i<\/code> est incr\u00e9ment\u00e9e. La boucle s&rsquo;arr\u00eate lorsque <code>i<\/code> atteint 6, car la condition <code>i&lt;=5<\/code> n&rsquo;est plus vraie.<\/p>\n\n\n\n<p>En r\u00e9sum\u00e9, la boucle <code>for<\/code> en Bash est une structure puissante pour r\u00e9p\u00e9ter des actions un certain nombre de fois en sp\u00e9cifiant clairement le point de d\u00e9part, la condition pour continuer, et l&rsquo;op\u00e9ration \u00e0 effectuer \u00e0 chaque it\u00e9ration.<\/p>\n\n\n\n<p><strong>Fonctions :<\/strong> Les fonctions permettent de regrouper des blocs de code pour une r\u00e9utilisation ais\u00e9e.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"601\" height=\"97\" src=\"https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-190409.png\" alt=\"\" class=\"wp-image-1162\" srcset=\"https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-190409.png 601w, https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-190409-300x48.png 300w\" sizes=\"auto, (max-width: 601px) 100vw, 601px\" \/><\/figure>\n<\/div>\n\n\n<h4 class=\"wp-block-heading\"><strong>Exemple de Script Bash Simple :<\/strong><\/h4>\n\n\n\n<p>Consid\u00e9rons un exemple de script Bash qui demande \u00e0 l&rsquo;utilisateur son nom et lui souhaite la bienvenue :<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"607\" height=\"167\" src=\"https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-190441.png\" alt=\"\" class=\"wp-image-1163\" srcset=\"https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-190441.png 607w, https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-190441-300x83.png 300w\" sizes=\"auto, (max-width: 607px) 100vw, 607px\" \/><\/figure>\n<\/div>\n\n\n<p>Ce script utilise la commande <code><strong>echo<\/strong><\/code> pour afficher des messages et <code><strong>read<\/strong><\/code> pour obtenir l&rsquo;entr\u00e9e utilisateur<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"298\" src=\"https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-220511-1024x298.png\" alt=\"\" class=\"wp-image-1197\" srcset=\"https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-220511-1024x298.png 1024w, https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-220511-300x87.png 300w, https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-220511-768x223.png 768w, https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-220511-1536x447.png 1536w, https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-220511.png 1871w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"684\" src=\"https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-220530-1024x684.png\" alt=\"\" class=\"wp-image-1198\" srcset=\"https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-220530-1024x684.png 1024w, https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-220530-300x201.png 300w, https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-220530-768x513.png 768w, https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-220530-1536x1027.png 1536w, https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-220530.png 1867w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"540\" src=\"https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-220545-1024x540.png\" alt=\"\" class=\"wp-image-1199\" srcset=\"https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-220545-1024x540.png 1024w, https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-220545-300x158.png 300w, https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-220545-768x405.png 768w, https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-220545-1536x810.png 1536w, https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-220545.png 1869w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"217\" src=\"https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-220616-1024x217.png\" alt=\"\" class=\"wp-image-1201\" srcset=\"https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-220616-1024x217.png 1024w, https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-220616-300x63.png 300w, https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-220616-768x162.png 768w, https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-220616-1536x325.png 1536w, https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-220616.png 1868w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"410\" src=\"https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-220637-1024x410.png\" alt=\"\" class=\"wp-image-1202\" srcset=\"https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-220637-1024x410.png 1024w, https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-220637-300x120.png 300w, https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-220637-768x308.png 768w, https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-220637-1536x615.png 1536w, https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-220637.png 1867w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"248\" src=\"https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-220649-1024x248.png\" alt=\"\" class=\"wp-image-1203\" srcset=\"https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-220649-1024x248.png 1024w, https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-220649-300x73.png 300w, https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-220649-768x186.png 768w, https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-220649-1536x372.png 1536w, https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-220649.png 1868w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"637\" src=\"https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-220702-1024x637.png\" alt=\"\" class=\"wp-image-1204\" srcset=\"https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-220702-1024x637.png 1024w, https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-220702-300x187.png 300w, https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-220702-768x477.png 768w, https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-220702-1536x955.png 1536w, https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-220702.png 1869w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"411\" src=\"https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-220717-1024x411.png\" alt=\"\" class=\"wp-image-1205\" srcset=\"https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-220717-1024x411.png 1024w, https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-220717-300x121.png 300w, https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-220717-768x309.png 768w, https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-220717-1536x617.png 1536w, https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/Capture-decran-2023-12-18-220717.png 1869w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/bash_script.jpg\" alt=\"\" class=\"wp-image-1170\" style=\"width:1024px;height:auto\" srcset=\"https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/bash_script.jpg 1024w, https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/bash_script-300x169.jpg 300w, https:\/\/s3curity.info\/wp\/wp-content\/uploads\/2023\/12\/bash_script-768x432.jpg 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Cet article vise \u00e0 fournir une introduction claire aux bases du scripting Bash. Pour enrichir davantage votre apprentissage, des exemples de scripts avec leurs significations seront ajout\u00e9s dans une mise \u00e0 jour ult\u00e9rieure. Restez \u00e0 l&rsquo;\u00e9coute pour des mises \u00e0 jour suppl\u00e9mentaires qui vous aideront \u00e0 explorer davantage les possibilit\u00e9s du scripting Bash et \u00e0 renforcer vos comp\u00e9tences en programmation shell.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Qu&rsquo;est-ce que le Bash ? Introduction au Bash : Bash, acronyme de Bourne Again SHell, est un interpr\u00e9teur de commandes ou shell d\u00e9velopp\u00e9 pour les syst\u00e8mes Unix et Linux. Il s&rsquo;agit d&rsquo;un descendant du shell Bourne (sh) et est devenu le shell par d\u00e9faut sur de nombreux syst\u00e8mes Unix. Caract\u00e9ristiques principales :<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13,11,16,20,10,15],"tags":[],"class_list":["post-1157","post","type-post","status-publish","format-standard","hentry","category-blue-team","category-capture-the-flag","category-hacking","category-linux","category-lunii","category-red-team"],"_links":{"self":[{"href":"https:\/\/s3curity.info\/wp\/wp-json\/wp\/v2\/posts\/1157","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/s3curity.info\/wp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/s3curity.info\/wp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/s3curity.info\/wp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/s3curity.info\/wp\/wp-json\/wp\/v2\/comments?post=1157"}],"version-history":[{"count":17,"href":"https:\/\/s3curity.info\/wp\/wp-json\/wp\/v2\/posts\/1157\/revisions"}],"predecessor-version":[{"id":1382,"href":"https:\/\/s3curity.info\/wp\/wp-json\/wp\/v2\/posts\/1157\/revisions\/1382"}],"wp:attachment":[{"href":"https:\/\/s3curity.info\/wp\/wp-json\/wp\/v2\/media?parent=1157"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/s3curity.info\/wp\/wp-json\/wp\/v2\/categories?post=1157"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/s3curity.info\/wp\/wp-json\/wp\/v2\/tags?post=1157"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}