Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Penetration Testing with Perl

Buy
Penetration Testing with Perl, 9781783283453 (1783283459), Packt Publishing, 2015

Harness the power of Perl to perform professional penetration testing

About This Book

  • Write your own custom information security tools using Perl and object-oriented Perl modules
  • Apply powerful Perl Regular Expression syntax to finely tune intelligence gathering techniques
  • Develop a clear understanding of how common attacking tools can function during a penetration test

Who This Book Is For

If you are an expert Perl programmer interested in penetration testing or information security, this guide is designed for you. However, it will also be helpful for you even if you have little or no Linux shell experience.

What You Will Learn

  • Develop your knowledge on the methodology, legality, and ethics involved in penetration testing
  • Utilize Linux OS, shell, and networking utilities using Perl
  • Manipulate and capture LAN network traffic in modern switched environments
  • Apply Perl to the Aircrack-ng suite
  • Combine external, internal, and Internet footprinting, and open source intelligence gathering
  • Perform web penetration testing and automation, including Local and Remote File Inclusion, SQL injection, cross-site scripting, and CMS vulnerability analysis
  • Stabilize your tests by using patterns such as Action Wrapper and Black Hole Proxy

In Detail

This guide will teach you the fundamentals of penetration testing with Perl, providing an understanding of the mindset of a hacker. In the first few chapters, you will study how to utilize Perl with Linux and the regular expression syntax. After that, you will learn how to use Perl for WAN target analysis, and Internet and external footprinting. You will learn to use Perl for automated web application and site penetration testing. We also cover intelligence gathering techniques from data obtained from footprinting and simple file forensics with file metadata.

By the end of this book, you will bring all of your code together into a simple graphical user interface penetration testing framework. Through this guide, you will have acquired the knowledge to apply Perl programming to any penetration testing phase and learn the importance of applying our technique in the methodology and context of the Penetration Testing Execution Standard.

(HTML tags aren't allowed.)

Show Me Microsoft Windows XP
Show Me Microsoft Windows XP

Microsoft Windows XP Home and Professional editions provide an elegant new user interface and powerful new tools with which to burn a CD, view and manage digital photos and music, and invite PC experts to see and manipulate what's on your screen over the Internet. This book covers all the important tasks that readers need to know, from using...

Realitätstreue, Natürlichkeit, Plausibilität: Perzeptive Beurteilungen in der Elektroakustik (German Edition)
Realitätstreue, Natürlichkeit, Plausibilität: Perzeptive Beurteilungen in der Elektroakustik (German Edition)

Dieses Buch richtet sich an Ingenieure und Forscher im Bereich der Kommunikationsakustik und anderen Gebieten der Wahrnehmungsforschung. Es bewegt sich im interdisziplinären Feld von Kommunikationsakustik, Informationstheorie und Wahrnehmungspsychologie und liefert einen wesentlichen Beitrag zum Verständnis der akustischen...

Java 8 Pocket Guide
Java 8 Pocket Guide

When you need quick answers for developing or debugging Java programs, this pocket guide provides a handy reference to standard features of the Java programming language and its platform. You’ll find helpful programming examples, tables, figures, and lists, as well as Java 8 features such as Lambda Expressions and the Date and...


Security Technology: International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference
Security Technology: International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference

We would like to welcome you to the proceedings of the 2009 International Conference on Security Technology (SecTech 2009), which was organized as part of the 2009 International Mega-Conference on Future Generation Information Technology (FGIT 2009), held during December 10–12, 2009, at the International Convention Center Jeju,...

Get Up to Speed with Online Marketing: How to Use Websites, Blogs, Social Networking and Much More
Get Up to Speed with Online Marketing: How to Use Websites, Blogs, Social Networking and Much More
This book shows you how to get up to speed with online marketing and go where your market is so you can effectively promote your business on a limited budget. The book explains in a straightforward style all there is to know about promoting small businesses online, and covers all the major online tools available, including...
Photonic Waveguide Components on Silicon Substrate: Modeling and Experiments (SpringerBriefs in Applied Sciences and Technology)
Photonic Waveguide Components on Silicon Substrate: Modeling and Experiments (SpringerBriefs in Applied Sciences and Technology)
This book focuses on the design and development of SU-8 polymer and silicon waveguide-based devices using the effective index based matrix method. Various fabrication techniques like laser direct writing (LDW), Focused Ion Beam (FIB) and optical lithography are discussed. FIB lithography has been explored for photonic-crystal structures on...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy