ebook img

Coding for Penetration Testers PDF

447 Pages·2016·17.162 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Coding for Penetration Testers

Coding for Penetration Testers Building Better Tools SECOND EDITION Jason Andress Ryan Linn Table of Contents Cover image Title page Copyright Dedication About the Authors Chapter 0. Introduction Book Overview and Key Learning Points Book Audience How This Book is Organized Conclusion Chapter 1. Introduction to command shell scripting Abstract On Shell Scripting UNIX, Linux, and OS X Shell Scripting Bash Basics Putting It All Together With Bash Windows Scripting PowerShell Basics Putting It All Together With PowerShell Summary References Chapter 2. Introduction to Python Abstract What Is Python? Where Is Python Useful? Python Basics File Manipulation Network Communications Summary References Chapter 3. Introduction to Perl Abstract Introduction Where Perl Is Useful Working With Perl Perl Basics Putting It All Together Summary References Chapter 4. Introduction to Ruby Abstract Introduction Where Ruby Is Useful Ruby Basics Building Classes With Ruby File Manipulation Database Basics Network Operations Putting It All Together Summary References Chapter 5. Introduction to web scripting with PHP Abstract Introduction Where Web scripting Is Useful Getting Started With PHP PHP Basics Handling Forms With PHP File Handling and Command Execution Putting It All Together Summary Chapter 6. Manipulating Windows with PowerShell Abstract Dealing With Execution Policies in PowerShell Execution Policies Getting In Penetration Testing Uses for PowerShell PowerShell and Metasploit Summary References Chapter 7. Scanner scripting Abstract Introduction Working With Scanning Tools Netcat Nmap Nessus/OpenVAS Summary References Chapter 8. Information gathering Abstract Introduction Information Gathering for Penetration Testing Talking to Google Web Automation With Perl Working With Metadata Putting It All Together Summary References Chapter 9. Exploitation scripting Abstract Introduction Building Exploits With Python Creating Metasploit Exploits Exploiting PHP Scripts Summary Chapter 10. Postexploitation scripting Abstract Introduction Why Postexploitation Is Important? Windows Shell Commands Gathering Network Information Scripting Metasploit Meterpreter Database Postexploitation Summary Index Copyright Syngress is an imprint of Elsevier 50 Hampshire Street, 5th Floor, Cambridge, MA 02139, United States Copyright © 2017, 2012 Elsevier Inc. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system, without permission in writing from the publisher. Details on how to seek permission, further information about the Publisher’s permissions policies and our arrangements with organizations such as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website: www.elsevier.com/permissions. This book and the individual contributions contained in it are protected under copyright by the Publisher (other than as may be noted herein). Notices Knowledge and best practice in this field are constantly changing. As new research and experience broaden our understanding, changes in research methods, professional practices, or medical treatment may become necessary. Practitioners and researchers must always rely on their own experience and knowledge in evaluating and using any information, methods, compounds, or experiments described herein. In using such information or methods they should be mindful of their own safety and the safety of others, including parties for whom they have a professional responsibility. To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any liability for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products, instructions, or ideas contained in the material herein. British Library Cataloguing-in-Publication Data A catalogue record for this book is available from the British Library Library of Congress Cataloging-in-Publication Data A catalog record for this book is available from the Library of Congress ISBN: 978-0-12-805472-7 For Information on all Syngress publications visit our website at https://www.elsevier.com Publisher: Todd Green Acquisition Editor: Chris Katsaropoulos Editorial Project Manager: Anna Valutkevich Production Project Manager: Punithavathy Govindaradjane Designer: Mark Rogers Typeset by MPS Limited, Chennai, India

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.