Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Penetration Testing with Perl

Penetration Testing with Perl, 9781783283453 (1783283459), Packt Publishing, 2015

Harness the power of Perl to perform professional penetration testing

About This Book

  • Write your own custom information security tools using Perl and object-oriented Perl modules
  • Apply powerful Perl Regular Expression syntax to finely tune intelligence gathering techniques
  • Develop a clear understanding of how common attacking tools can function during a penetration test

Who This Book Is For

If you are an expert Perl programmer interested in penetration testing or information security, this guide is designed for you. However, it will also be helpful for you even if you have little or no Linux shell experience.

What You Will Learn

  • Develop your knowledge on the methodology, legality, and ethics involved in penetration testing
  • Utilize Linux OS, shell, and networking utilities using Perl
  • Manipulate and capture LAN network traffic in modern switched environments
  • Apply Perl to the Aircrack-ng suite
  • Combine external, internal, and Internet footprinting, and open source intelligence gathering
  • Perform web penetration testing and automation, including Local and Remote File Inclusion, SQL injection, cross-site scripting, and CMS vulnerability analysis
  • Stabilize your tests by using patterns such as Action Wrapper and Black Hole Proxy

In Detail

This guide will teach you the fundamentals of penetration testing with Perl, providing an understanding of the mindset of a hacker. In the first few chapters, you will study how to utilize Perl with Linux and the regular expression syntax. After that, you will learn how to use Perl for WAN target analysis, and Internet and external footprinting. You will learn to use Perl for automated web application and site penetration testing. We also cover intelligence gathering techniques from data obtained from footprinting and simple file forensics with file metadata.

By the end of this book, you will bring all of your code together into a simple graphical user interface penetration testing framework. Through this guide, you will have acquired the knowledge to apply Perl programming to any penetration testing phase and learn the importance of applying our technique in the methodology and context of the Penetration Testing Execution Standard.

(HTML tags aren't allowed.)

Computational Intelligence in Telecommunications Networks
Computational Intelligence in Telecommunications Networks

Telecommunications has evolved and grown at an explosive rate in recent years and will undoubtedly continue to do so. As its functions, applications, and technology grow, it becomes increasingly complex and difficult, if not impossible, to meet the demands of a global network using conventional computing technologies. Computational...

Lonely Planet Pocket Los Angeles (Encounter)
Lonely Planet Pocket Los Angeles (Encounter)

Get Straight to the Heart of the City
Top Sights. The city’s must-see sights plus expert advice to make your trip even better.
Local Life. Discover how to unlock the city with guides to areas that the locals really love.
Best of Los Angeles. We’ve found the best walks, food, art

Object-Oriented ActionScript For Flash 8
Object-Oriented ActionScript For Flash 8
If there’s one thing I’ve learned as a developer, it’s this: Complexity happens; simplicity, you have to consistently strive for. Nowhere is this truer than in education. Our role as teachers, by definition, is to simplify subjects so that they can be easily understood. A good teacher dispels trepidation with anecdote, abstraction...

SQL for MySQL Developers: A Comprehensive Tutorial and Reference
SQL for MySQL Developers: A Comprehensive Tutorial and Reference
The Most Complete and Practical Guide to MySQL Version 5’s Powerful SQL Dialect


MySQL version 5 offers a SQL dialect with immense power. In SQL for MySQL Developers, Rick F. van der Lans helps you master this version ofSQL and take advantage of its full...

Swift for Absolute Beginners
Swift for Absolute Beginners

The professional development team that brought you two editions of Objective-C for the Absolute Beginners and have taught thousands of developers around the world to write some of the most popular iPhone apps in their categories on the app store, have now leveraged their instruction for Swift.

Swift for Absolute...

Seamless Object-Oriented Software Architecture: Analysis and Design of Reliable Systems
Seamless Object-Oriented Software Architecture: Analysis and Design of Reliable Systems
In the past few years, object-oriented techniques have finally made the passage
from the programming-in-the-small island to the mainland of programming-inthe-
large. Accompanying this transition has been a change in the role and
perception of software methods: in addition to their well-established use in the
earliest stages of a
©2019 LearnIT (support@pdfchm.net) - Privacy Policy