Book description
Coding for Penetration Testers discusses the use of various scripting languages in penetration testing. The book presents step-by-step instructions on how to build customized penetration testing tools using Perl, Ruby, Python, and other languages. It also provides a primer on scripting including, but not limited to, Web scripting, scanner scripting, and exploitation scripting. It guides the student through specific examples of custom tool development that can be incorporated into a tester's toolkit as well as real-world scenarios where such tools might be used. This book is divided into 10 chapters that explores topics such as command shell scripting; Python, Perl, and Ruby; Web scripting with PHP; manipulating Windows with PowerShell; scanner scripting; information gathering; exploitation scripting; and post-exploitation scripting. This book will appeal to penetration testers, information security practitioners, and network and system administrators.
- Discusses the use of various scripting languages in penetration testing
- Presents step-by-step instructions on how to build customized penetration testing tools using Perl, Ruby, Python, and other languages
- Provides a primer on scripting including, but not limited to, Web scripting, scanner scripting, and exploitation scripting
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright
- Foreword
- About the Authors
- About the Technical Editor
- Acknowledgments
- Chapter 0. Introduction
- Chapter 1. Introduction to command shell scripting
- Chapter 2. Introduction to Python
- Chapter 3. Introduction to Perl
- Chapter 4. Introduction to Ruby
- Chapter 5. Introduction to Web scripting with PHP
- Chapter 6. Manipulating Windows with PowerShell
- Chapter 7. Scanner scripting
- Chapter 8. Information gathering
- Chapter 9. Exploitation scripting
- Chapter 10. Post-exploitation scripting
- Appendix: Subnetting and CIDR addresses
- Index
Product information
- Title: Coding for Penetration Testers
- Author(s):
- Release date: November 2011
- Publisher(s): Syngress
- ISBN: 9781597497305
You might also like
book
Coding for Penetration Testers, 2nd Edition
Coding for Penetration Testers: Building Better Tools, Second Edition provides readers with an understanding of the …
book
Kali Linux CTF Blueprints
Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be …
book
The Mac Hacker's Handbook
As more and more vulnerabilities are found in the Mac OS X (Leopard) operating system, security …
book
Google Hacking for Penetration Testers, 3rd Edition
Google is the most popular search engine ever created, but Google’s search capabilities are so powerful, …