Penetration Testing with Perl Год: 2014 Автор: Douglas Berdeaux Издательство: Packt Publishing ISBN: 9781783283453 Язык: Английский Формат: PDF/MOBI Качество: Изначально компьютерное (eBook) Интерактивное оглавление: Да Количество страниц: 332 Описание: This guide will teach you the fundamentals of penetration testing with Perl, providing an understanding of the mindset of a hacker. In the first few chapters, you will study how to utilize Perl with Linux and the regular expression syntax. After that, you will learn how to use Perl for WAN target analysis, and Internet and external footprinting. You will learn to use Perl for automated web application and site penetration testing. We also cover intelligence gathering techniques from data obtained from footprinting and simple file forensics with file metadata. By the end of this book, you will bring all of your code together into a simple graphical user interface penetration testing framework. Through this guide, you will have acquired the knowledge to apply Perl programming to any penetration testing phase and learn the importance of applying our technique in the methodology and context of the Penetration Testing Execution Standard.
Примеры страниц
Оглавление
1: Perl Programming Files Regular expressions Perl string functions and operators CPAN Perl modules CPAN minus Summary 2: Linux Terminal Output Built-in bash commands Input/output streams Killing runaway forked processes Summary 3: IEEE 802.3 Wired Network Mapping with Perl Footprinting Internet footprinting Common tools for scanning Designing our own live host scanner Summary 4: IEEE 802.3 Wired Network Manipulation with Perl Packet capturing MitM Enabling packet forwarding Network remapping with packet capture Summary 5: IEEE 802.11 Wireless Protocol and Perl 802.11 terminologies and packet analysis Linux wireless utilities 802.11 packet capturing with Perl Writing an 802.11 protocol analyzer in Perl Perl and Aircrack-ng Summary 6: Open Source Intelligence What's covered Google dorks E-mail address gathering Domain Name Services More intelligence Summary 7: SQL Injection with Perl Web service discovery SQL injection MySQL post exploitation Data-driven blind SQL injection Time-based blind SQL injection Summary 8: Other Web-based Attacks Cross-site scripting File inclusion vulnerability discovery Content management systems Summary 9: Password Cracking Digital credential analysis Cracking SHA1 and MD5 WPA2 passphrase cracking with Perl Cracking ZIP file passwords Summary 10: Metadata Forensics Metadata and Exif Metadata extractor Summary 11: Social Engineering with Perl Psychology Perl Linux/Unix viruses Spear phishing Summary 12: Reporting Who is this for? Documenting with Perl Logging data to MySQL HTML reporting Summary 13: Perl/Tk Event-driven programming Explaining the Perl/Tk widgets Widgets and the grid The GUI host discovery tool A tabbed GUI environment Summary
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum You cannot attach files in this forum You can download files in this forum