About This Book
- Write your own custom information security tools using Perl and object-oriented Perl modules
- Apply powerful Perl Regular Expression syntax to finely tune intelligence gathering techniques
- Develop a clear understanding of how common attacking tools can function during a penetration test
Who This Book Is For
If you are an expert Perl programmer interested in penetration testing or information security, this guide is designed for you. However, it will also be helpful for you even if you have little or no Linux shell experience.
What You Will Learn
- Develop your knowledge on the methodology, legality, and ethics involved in penetration testing
- Utilize Linux OS, shell, and networking utilities using Perl
- Manipulate and capture LAN network traffic in modern switched environments
- Apply Perl to the Aircrack-ng suite
- Combine external, internal, and Internet footprinting, and open source intelligence gathering
- Perform web penetration testing and automation, including Local and Remote File Inclusion, SQL injection, cross-site scripting, and CMS vulnerability analysis
- Stabilize your tests by using patterns such as Action Wrapper and Black Hole Proxy
+ comments + 1 comments
link not working
Post a Comment