Penetration Testing with Perl: RAW
|Also available on:|
- Write your own custom information security tools using Perl and object-oriented Perl modules
- Apply powerful Perl Regular Expression syntax to finely tune intelligence gathering techniques
- Develop a clear understanding of how common attacking tools can function during a penetration test
Book DetailsLanguage : English
Paperback : 301 pages [ 235mm x 191mm ]
Release Date : January 2015
ISBN : 1783283459
ISBN 13 : 9781783283453
Author(s) : Douglas Berdeaux
Topics and Technologies : All Books, Other, Open Source
||IN THE BOOK|
|2||LINUX Terminal Output||IN THE BOOK|
|3||Wired Network Mapping with Perl||IN THE BOOK|
|4||IEEE 802.3 Wired Network Manipulation with Perl||IN THE BOOK|
|5||Wifi 80211||IN THE BOOK|
||IN THE BOOK|
|7||WAN Host Reconnaissance||SEPTEMBER 2014|
|8||Web Penetration Testing with Perl||SEPTEMBER 2014|
|9||Password Cracking||SEPTEMBER 2014|
|11||Social Engineering - Adaptive Penetration Testing||SEPTEMBER 2014|
|13||Perl::Tk (GUI development)||OCTOBER 2014|
Please let us know if you have found any errors not listed on this list by completing our errata submission form. Our editors will check them and add them to this list. Thank you.
Sorry, there are currently no downloads available for this title.
What you will learn from this book
- Develop your knowledge on the methodology, legality, and ethics involved in penetration testing
- Utilize Linux OS, shell, and networking utilities using Perl
- Manipulate and capture LAN network traffic in modern switched environments
- Apply Perl to the Aircrack-NG Suite
- Combine external, internal, and Internet Footprinting, and open source intelligence gathering
- Perform web penetration testing and automation, including Local and Remote File Inclusion, SQL Injection, Cross-Site Scripting, and CMS vulnerability analysis
- Stabilize your tests by using patterns such as Action Wrapper and Black Hole Proxy patterns
Perl is a powerful ally for any security enthusiast as it can thrive on over 100 different OS platforms. Its creation took over a quarter of a century and involved a worldwide contribution to its code base. The Penetration Testing Execution Standard is a clear definition of the methodology used to provide businesses and institutions with the standard practices and information logistics of a penetration test. Perl has been the language of choice for many penetration testers due to its maturity, powerful data manipulation abilities, and the Comprehensive Perl Archive Network (CPAN), providing 15 years of Perl libraries at your fingertips.
This guide will teach you the fundamentals of penetration testing with Perl, providing an understanding of the mindset of a hacker, and demonstrate the best techniques for securing systems against common attacks. In the first few chapters, you will study how to utilize Perl with Linux and Regular Expression syntax. After that, you will learn how to use Perl for WAN target analysis, and Internet and External Footprinting. You will learn to use Perl for automated web application and site penetration testing. We also cover intelligence gathering techniques from data obtained from Footprinting and simple file forensics with file metadata.
By the end of this book we will bring all of our code together into a simple graphical user interface penetration testing framework too. Through this guide you will have acquired the knowledge to apply Perl programming to any penetration testing phase and learn the importance of applying our technique in the methodology and context of the Penetration Testing Execution Standard.
This book is currently available as a RAW (Read As we Write) book. A RAW book is an ebook, and this one is priced at 20% off the usual eBook price. Once you purchase the RAW book, you can immediately download the content of the book so far, and when new chapters become available, you will be notified, and can download the new version of the book. When the book is published, you will receive the full, finished eBook.
If you like, you can preorder the print book at the same time as you purchase the RAW book at a significant discount.
Since a RAW book is an eBook, a RAW book is non returnable and non refundable.
Local taxes may apply to your eBook purchase.
This is a friendly, in-depth guide designed to ease newcomers into a new world of penetration testing with Perl by presenting the topics at different angles and levels, gradually stepping through code and byte data.
Who this book is for
If you are an expert Perl programmer interested in penetration testing or information security, this guide is designed for you. However, it is also helpful for you even if you have little or no Linux shell experience.