Book description
Coding for Penetration Testers discusses the use of various scripting languages in penetration testing. The book presents step-by-step instructions on how to build customized penetration testing tools using Perl, Ruby, Python, and other languages. It also provides a primer on scripting including, but not limited to, Web scripting, scanner scripting, and exploitation scripting. It guides the student through specific examples of custom tool development that can be incorporated into a tester's toolkit as well as real-world scenarios where such tools might be used. This book is divided into 10 chapters that explores topics such as command shell scripting; Python, Perl, and Ruby; Web scripting with PHP; manipulating Windows with PowerShell; scanner scripting; information gathering; exploitation scripting; and post-exploitation scripting. This book will appeal to penetration testers, information security practitioners, and network and system administrators.
- Discusses the use of various scripting languages in penetration testing
- Presents step-by-step instructions on how to build customized penetration testing tools using Perl, Ruby, Python, and other languages
- Provides a primer on scripting including, but not limited to, Web scripting, scanner scripting, and exploitation scripting
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright
- Foreword
- About the Authors
- About the Technical Editor
- Acknowledgments
- Chapter 0. Introduction
- Chapter 1. Introduction to command shell scripting
- Chapter 2. Introduction to Python
- Chapter 3. Introduction to Perl
- Chapter 4. Introduction to Ruby
- Chapter 5. Introduction to Web scripting with PHP
- Chapter 6. Manipulating Windows with PowerShell
- Chapter 7. Scanner scripting
- Chapter 8. Information gathering
- Chapter 9. Exploitation scripting
- Chapter 10. Post-exploitation scripting
- Appendix: Subnetting and CIDR addresses
- Index
Product information
- Title: Coding for Penetration Testers
- Author(s):
- Release date: November 2011
- Publisher(s): Syngress
- ISBN: 9781597497305
You might also like
book
Coding for Penetration Testers, 2nd Edition
Coding for Penetration Testers: Building Better Tools, Second Edition provides readers with an understanding of the …
book
A Guide to Kernel Exploitation
A Guide to Kernel Exploitation: Attacking the Core discusses the theoretical techniques and approaches needed to …
book
Hands-On Penetration Testing on Windows
Master the art of identifying vulnerabilities within the Windows OS and develop the desired solutions for …
book
Kali Linux CTF Blueprints
Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be …