Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Penetration Testing with Perl

Buy
Penetration Testing with Perl, 9781783283453 (1783283459), Packt Publishing, 2015

Harness the power of Perl to perform professional penetration testing

About This Book

  • Write your own custom information security tools using Perl and object-oriented Perl modules
  • Apply powerful Perl Regular Expression syntax to finely tune intelligence gathering techniques
  • Develop a clear understanding of how common attacking tools can function during a penetration test

Who This Book Is For

If you are an expert Perl programmer interested in penetration testing or information security, this guide is designed for you. However, it will also be helpful for you even if you have little or no Linux shell experience.

What You Will Learn

  • Develop your knowledge on the methodology, legality, and ethics involved in penetration testing
  • Utilize Linux OS, shell, and networking utilities using Perl
  • Manipulate and capture LAN network traffic in modern switched environments
  • Apply Perl to the Aircrack-ng suite
  • Combine external, internal, and Internet footprinting, and open source intelligence gathering
  • Perform web penetration testing and automation, including Local and Remote File Inclusion, SQL injection, cross-site scripting, and CMS vulnerability analysis
  • Stabilize your tests by using patterns such as Action Wrapper and Black Hole Proxy

In Detail

This guide will teach you the fundamentals of penetration testing with Perl, providing an understanding of the mindset of a hacker. In the first few chapters, you will study how to utilize Perl with Linux and the regular expression syntax. After that, you will learn how to use Perl for WAN target analysis, and Internet and external footprinting. You will learn to use Perl for automated web application and site penetration testing. We also cover intelligence gathering techniques from data obtained from footprinting and simple file forensics with file metadata.

By the end of this book, you will bring all of your code together into a simple graphical user interface penetration testing framework. Through this guide, you will have acquired the knowledge to apply Perl programming to any penetration testing phase and learn the importance of applying our technique in the methodology and context of the Penetration Testing Execution Standard.

(HTML tags aren't allowed.)

Giant Planets of Our Solar System: Atmospheres, Composition, and Structure (Springer Praxis Books / Astronomy and Planetary Sciences)
Giant Planets of Our Solar System: Atmospheres, Composition, and Structure (Springer Praxis Books / Astronomy and Planetary Sciences)
"Irwin […] has done an outstanding job of presenting material geared to upper-division undergraduates and beginning graduate students." (J.R. Kraus (University of Denver), Choice Feb. 2004)

This book reviews the current state of knowledge of the atmospheres of the giant gaseous planets: Jupiter, Saturn, Uranus, and Neptune. The...

Active Directory By the Numbers: Windows Server 2003
Active Directory By the Numbers: Windows Server 2003
This text takes you step-by-step through the fascinating world of inter-connected computing. Learn the basics, how to keep client computers up to date, back up servers, protect servers from viruses, and much more.

Windows Server 2003, Microsoft’s newest server operating system, builds upon the legendary scalability and flexibility...

The Adventures of Tintin in the Land of the Soviets
The Adventures of Tintin in the Land of the Soviets

This new facsimile reprint of the very first adventure of one of the world's most beloved cartoon characters shows Tintin's creator, the famed Belgian cartoonist Herge, just beginning to learn his craft. The story was originally created in 1929 for a children's supplement in the Belgian newspaper Le Vingtieme Siecle. Readers meet Tintin,...


Scientific Data Analysis using Jython Scripting and Java (Advanced Information and Knowledge Processing)
Scientific Data Analysis using Jython Scripting and Java (Advanced Information and Knowledge Processing)

Over the course of the past twenty years I have learned many things relevant to this book while working in high-energy physics. As everyone in this field in the yearly to mid-90s, I was analyzing experimental data collected by particle colliders using the FORTRAN programming language. Then, gradually, I moved to C++ coding following...

Stripes by Example
Stripes by Example

In this 100-page book, you will find that Stripes provides a very simple learning path, where you do not need to understand the entire framework in order to use it. The concept of this book is exactly that – to get you using the framework and writing code immediately. You will be off and running in no time, and adding to your skill set...

Ancient Scholarship and Grammar: Archetypes, Concepts and Contexts
Ancient Scholarship and Grammar: Archetypes, Concepts and Contexts

The volume aims at investigating archetypes, concepts and contexts of the ancient philological discipline from a historical, methodological and ideological perspective. It includes 26 contributions by leading scholars divided into four sections: The ancient scholars at work, The ancient grammarians on Greek language and linguistic...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy