Penetration Testing with Perl Front Cover

Penetration Testing with Perl

  • Length: 301 pages
  • Edition: 1
  • Publisher:
  • Publication Date: 2015-01-12
  • ISBN-10: 1783283459
  • ISBN-13: 9781783283453
  • Sales Rank: #4294387 (See Top 100 Books)

Harness the power of Perl to perform professional penetration testing

About This Book

  • Write your own custom information security tools using Perl and object-oriented Perl modules
  • Apply powerful Perl Regular Expression syntax to finely tune intelligence gathering techniques
  • Develop a clear understanding of how common attacking tools can function during a penetration test

Who This Book Is For

If you are an expert Perl programmer interested in penetration testing or information security, this guide is designed for you. However, it will also be helpful for you even if you have little or no Linux shell experience.

In Detail

This guide will teach you the fundamentals of penetration testing with Perl, providing an understanding of the mindset of a hacker. In the first few chapters, you will study how to utilize Perl with Linux and the regular expression syntax. After that, you will learn how to use Perl for WAN target analysis, and Internet and external footprinting. You will learn to use Perl for automated web application and site penetration testing. We also cover intelligence gathering techniques from data obtained from footprinting and simple file forensics with file metadata.

By the end of this book, you will bring all of your code together into a simple graphical user interface penetration testing framework. Through this guide, you will have acquired the knowledge to apply Perl programming to any penetration testing phase and learn the importance of applying our technique in the methodology and context of the Penetration Testing Execution Standard.

Table of Contents

Chapter 1. Perl Programming
Chapter 2. Linux Terminal Output
Chapter 3. IEEE 802.3 Wired Network Mapping with Perl
Chapter 4. IEEE 802.3 Wired Network Manipulation with Perl
Chapter 5. IEEE 802.11 Wireless Protocol and Perl
Chapter 6. Open Source Intelligence
Chapter 7. SQL Injection with Perl
Chapter 8. Other Web-based Attacks
Chapter 9. Password Cracking
Chapter 10. Metadata Forensics
Chapter 11. Social Engineering with Perl
Chapter 12. Reporting
Chapter 13. Perl/Tk

To access the link, solve the captcha.