Cover image for Penetration Testing with Perl.
Penetration Testing with Perl.
Title:
Penetration Testing with Perl.
Author:
Berdeaux, Douglas.
ISBN:
9781783283460
Personal Author:
Physical Description:
1 online resource (347 pages)
Contents:
Penetration Testing with Perl -- Table of Contents -- Penetration Testing with Perl -- Credits -- About the Author -- About the Reviewers -- www.PacktPub.com -- Support files, eBooks, discount offers, and more -- Why subscribe? -- Free access for Packt account holders -- Preface -- What this book covers -- What you need for this book -- Who this book is for -- Conventions -- Reader feedback -- Customer support -- Downloading the example code -- Errata -- Piracy -- Questions -- 1. Perl Programming -- Files -- Regular expressions -- Literals versus metacharacters -- Quantifiers -- Anchors -- Character classes -- Ranged character classes -- Grouping text (strings) -- Backreferences -- Perl string functions and operators -- The Perl m// matching operator -- The Perl s/// substitution operator -- Regular expressions and the split() function -- Regular expressions and the grep() function -- CPAN Perl modules -- CPAN minus -- Summary -- 2. Linux Terminal Output -- Built-in bash commands -- Variable expansion, grouping, and arguments -- Script execution from bash -- Input/output streams -- Output to files -- Input redirection -- Output to an input stream -- Error handling with the shell -- Basic bash programming -- Forking processes in the shell -- Killing runaway forked processes -- Bash command execution from Perl -- Summary -- 3. IEEE 802.3 Wired Network Mapping with Perl -- Footprinting -- Internet footprinting -- Common tools for scanning -- Address Resolution Protocol scanning tools -- Server Message Block information tools -- Internet Control Message Protocol versus Transmission Control Protocol versus ARP discovery -- Designing our own live host scanner -- Designing our own port scanner -- Writing an SMB scanner -- Banner grabbing -- A brute force application -- Summary -- 4. IEEE 802.3 Wired Network Manipulation with Perl -- Packet capturing.

Packet capture filtering -- Packet layers -- The application layer -- MitM -- ARP spoofing with Perl -- Enabling packet forwarding -- Network remapping with packet capture -- Summary -- 5. IEEE 802.11 Wireless Protocol and Perl -- 802.11 terminologies and packet analysis -- Management frames -- Control and data frames -- Linux wireless utilities -- RFMON versus probing -- 802.11 packet capturing with Perl -- 802.11 frame headers -- Writing an 802.11 protocol analyzer in Perl -- Perl and Aircrack-ng -- Summary -- 6. Open Source Intelligence -- What's covered -- Google dorks -- E-mail address gathering -- Using Google for e-mail address gathering -- Using social media for e-mail address gathering -- Google+ -- LinkedIn -- Facebook -- Domain Name Services -- The Whois query -- The DIG query -- Brute force enumeration -- Zone transfers -- Traceroute -- Shodan -- More intelligence -- Summary -- 7. SQL Injection with Perl -- Web service discovery -- Service discovery -- File discovery -- SQL injection -- GET requests -- Integer SQL injection -- String SQL injection -- SQL column counting -- MySQL post exploitation -- Discovering the column count -- Gathering server information -- Obtaining table result sets -- Obtaining records -- Data-driven blind SQL injection -- Time-based blind SQL injection -- Summary -- 8. Other Web-based Attacks -- Cross-site scripting -- The reflected XSS -- URL encoding -- Enhancing the XSS attack -- XSS caveats and hints -- File inclusion vulnerability discovery -- Local File Inclusion -- Logfile code injection -- Remote File Inclusion -- Content management systems -- Summary -- 9. Password Cracking -- Digital credential analysis -- Cracking SHA1 and MD5 -- SHA1 cracking with Perl -- Parallel processing in Perl -- MD5 cracking with Perl -- Using online resources for password cracking -- Salted hashes -- Linux passwords.

WPA2 passphrase cracking with Perl -- Four-way Handshake -- 802.11 EAPOL Message 1 -- 802.11 EAPOL Message 2 -- The Perl WPA2 cracking program -- Cracking ZIP file passwords -- Summary -- 10. Metadata Forensics -- Metadata and Exif -- Metadata extractor -- Extracting metadata from images -- Extracting metadata from PDF files -- Summary -- 11. Social Engineering with Perl -- Psychology -- Perl Linux/Unix viruses -- Optimization for trust -- Virus replication -- Spear phishing -- Spoofing e-mails with Perl -- Setting up Exim4 -- Using the Mail::Sendmail Perl module -- Summary -- 12. Reporting -- Who is this for? -- Executive Report -- Technical Report -- Documenting with Perl -- STDOUT piping -- CSV versus TXT -- Graphing with Perl -- Creating a PDF file -- Logging data to MySQL -- HTML reporting -- Summary -- 13. Perl/Tk -- Event-driven programming -- Explaining the Perl/Tk widgets -- Widgets and the grid -- The GUI host discovery tool -- A tabbed GUI environment -- Summary -- Index.
Abstract:
If you are an expert Perl programmer interested in penetration testing or information security, this guide is designed for you. However, it will also be helpful for you even if you have little or no Linux shell experience.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic Access:
Click to View
Holds: Copies: