Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Penetration Testing with Perl

Buy
Penetration Testing with Perl, 9781783283453 (1783283459), Packt Publishing, 2015

Harness the power of Perl to perform professional penetration testing

About This Book

  • Write your own custom information security tools using Perl and object-oriented Perl modules
  • Apply powerful Perl Regular Expression syntax to finely tune intelligence gathering techniques
  • Develop a clear understanding of how common attacking tools can function during a penetration test

Who This Book Is For

If you are an expert Perl programmer interested in penetration testing or information security, this guide is designed for you. However, it will also be helpful for you even if you have little or no Linux shell experience.

What You Will Learn

  • Develop your knowledge on the methodology, legality, and ethics involved in penetration testing
  • Utilize Linux OS, shell, and networking utilities using Perl
  • Manipulate and capture LAN network traffic in modern switched environments
  • Apply Perl to the Aircrack-ng suite
  • Combine external, internal, and Internet footprinting, and open source intelligence gathering
  • Perform web penetration testing and automation, including Local and Remote File Inclusion, SQL injection, cross-site scripting, and CMS vulnerability analysis
  • Stabilize your tests by using patterns such as Action Wrapper and Black Hole Proxy

In Detail

This guide will teach you the fundamentals of penetration testing with Perl, providing an understanding of the mindset of a hacker. In the first few chapters, you will study how to utilize Perl with Linux and the regular expression syntax. After that, you will learn how to use Perl for WAN target analysis, and Internet and external footprinting. You will learn to use Perl for automated web application and site penetration testing. We also cover intelligence gathering techniques from data obtained from footprinting and simple file forensics with file metadata.

By the end of this book, you will bring all of your code together into a simple graphical user interface penetration testing framework. Through this guide, you will have acquired the knowledge to apply Perl programming to any penetration testing phase and learn the importance of applying our technique in the methodology and context of the Penetration Testing Execution Standard.

(HTML tags aren't allowed.)

Handbook of Parenting: Volume 5: Practical Issues in Parenting, Second Edition
Handbook of Parenting: Volume 5: Practical Issues in Parenting, Second Edition

Completely revised and expanded from four to five volumes, this new edition of the Handbook of Parenting appears at a time that is momentous in the history of parenting. Parenting and the family are today in a greater state of flux, question, and redefinition than perhaps ever before. We are witnessing the emergence of striking...

Framing the Jina: Narratives of Icons and Idols in Jain History
Framing the Jina: Narratives of Icons and Idols in Jain History

John Cort explores the narratives by which the Jains have explained the presence of icons of Jinas (their enlightened and liberated teachers) that are worshiped and venerated in the hundreds of thousands of Jain temples throughout India. Most of these narratives portray icons favorably, and so justify their existence; but there are also...

Beginning Windows 10: Do More with Your PC
Beginning Windows 10: Do More with Your PC

Beginning Windows 10 takes you through the new features of this amazing new operating system, revealing some of its surprising capabilities, and helping you customize it to suit you. Whether you are new to Windows, or you want to get up to speed with the latest features and changes, this book has everything you need to get started.

...

MCSA/MCSE: Windows Server 2003 Network Security Administration Study Guide (70-299)
MCSA/MCSE: Windows Server 2003 Network Security Administration Study Guide (70-299)
Here's the book you need to prepare for the Implementing and Administering Security in a Microsoft Windows Server 2003 Network exam (70-299). This Study Guide was developed to meet the exacting requirements of today's certification candidates. In addition to the consistent and...
Distributed .NET Programming in VB .NET
Distributed .NET Programming in VB .NET

With the release of .NET, Microsoft once again altered the distributed programming landscape. Almost everything changed, from data access, to remote object calls, to the deployment of software components. And of course, .NET introduced a new technology in XML Web services that revolutionized Web development.

Distributed .NET...

The Central Nervous System
The Central Nervous System

The Central Nervous System: Structure and Function, Fourth Edition continues the tradition of one of the most respected textbooks in clinical neuroscience by providing medical students the knowledge and understanding of neuroscience as a basis for clinical thinking. While remaining concise and easy to read, the text encourages...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy