Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Penetration Testing with Perl

Penetration Testing with Perl, 9781783283453 (1783283459), Packt Publishing, 2015

Harness the power of Perl to perform professional penetration testing

About This Book

  • Write your own custom information security tools using Perl and object-oriented Perl modules
  • Apply powerful Perl Regular Expression syntax to finely tune intelligence gathering techniques
  • Develop a clear understanding of how common attacking tools can function during a penetration test

Who This Book Is For

If you are an expert Perl programmer interested in penetration testing or information security, this guide is designed for you. However, it will also be helpful for you even if you have little or no Linux shell experience.

What You Will Learn

  • Develop your knowledge on the methodology, legality, and ethics involved in penetration testing
  • Utilize Linux OS, shell, and networking utilities using Perl
  • Manipulate and capture LAN network traffic in modern switched environments
  • Apply Perl to the Aircrack-ng suite
  • Combine external, internal, and Internet footprinting, and open source intelligence gathering
  • Perform web penetration testing and automation, including Local and Remote File Inclusion, SQL injection, cross-site scripting, and CMS vulnerability analysis
  • Stabilize your tests by using patterns such as Action Wrapper and Black Hole Proxy

In Detail

This guide will teach you the fundamentals of penetration testing with Perl, providing an understanding of the mindset of a hacker. In the first few chapters, you will study how to utilize Perl with Linux and the regular expression syntax. After that, you will learn how to use Perl for WAN target analysis, and Internet and external footprinting. You will learn to use Perl for automated web application and site penetration testing. We also cover intelligence gathering techniques from data obtained from footprinting and simple file forensics with file metadata.

By the end of this book, you will bring all of your code together into a simple graphical user interface penetration testing framework. Through this guide, you will have acquired the knowledge to apply Perl programming to any penetration testing phase and learn the importance of applying our technique in the methodology and context of the Penetration Testing Execution Standard.

(HTML tags aren't allowed.)

Data Structures and Algorithms for Game Developers (Game Development Series)
Data Structures and Algorithms for Game Developers (Game Development Series)
Data Structures and Algorithms for Game Developers teaches the fundamentals of the data structures and algorithms used in game development. It provides programmers with a detailed reference to what data structures and algorithms are, and why they are so critical in game development. It teaches new game programmers, students, and aspiring game...
Cult of Analytics: Driving online marketing strategies using web analytics (Emarketing Essentials)
Cult of Analytics: Driving online marketing strategies using web analytics (Emarketing Essentials)
Back in the 1990s one of the common questions asked of online professionals was, ‘ what were you doing before the Internet? ’ The answers were many and varied and helped understand the drift of the ensuing conversation. Today, the most common answer is, ‘ I was in school ’ , delivered with a quizzical look as if wondering...
Mastering Digital SLR Photography
Mastering Digital SLR Photography

This unique guide emphasizes digital "photography", rather than software. You'll learn how to take compelling pictures and make great images using imaging technology while focusing on the special strengths of digital SLR cameras. Whether you're a snap-shooting tyro, or an experienced photographer moving into the digital SLR...

Encyclopedia of World Cultures Vol 9 : Africa
Encyclopedia of World Cultures Vol 9 : Africa
The peoples of Africa may be classified according to several criteria, probably the oldest of which is race. Africa is occupied by members of the Negroid race, the most numerous; then by members of the Caucasoid race, mainly in northern and southern Africa; the Mongoloid race (in Madagascar); and by the so-called Bushmanoid and Pygmoid races or...
Augmented Reality using Appcelerator Titanium Starter
Augmented Reality using Appcelerator Titanium Starter
I first starting thinking about human/machine augmentations in 2000 when I started a company focused in the Telco software space. Initially, I focused on how to enable wireless content development, but at that time, devices were primitive. High speed networks hadn't fully taken on in many areas of the U.S. for mobile networks...
Zero Emissions Power Cycles
Zero Emissions Power Cycles

Focusing on fossil-fueled, nonpolluting power generation systems, Zero Emissions Power Cycles presents alternative solutions to the severe emissions problems of power plants. Along with a description of new thermodynamic cycles and the results of computational analyses, this volume provides modern analytical tools and equations...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy