Coding for Penetration Testers

[desc]SYNGRESS

CoDING FOR
aN eV a eae

Building Better Tools

wy,

SET PAS kat y .

Ryan Linn[/desc][img]72616-Coding%20For%20Pentester.webp[/img][bookmark]{“51″: [2,”Handling Forms with PHP”,172],”14″: [2,”On Shell Scripting”,26],”71″: [2,”Web Automation with Perl”,234],”24″: [2,”What is Python?”,60],”35″: [2,”Putting It All together”,116],”45″: [2,”Putting It All Together”,154],”25″: [2,”Where is Python Useful?”,61],”40″: [2,”Ruby Basics”,125],”36″: [2,”Summary”,122],”80″: [2,”Cross-Site Scripting”,273],”87″: [2,”Database Post-Exploitation”,295],”10″: [2,”Book Audience”,21],”29″: [2,”Summary”,93],”78″: [2,”Creating Metasploit Exploits”,262],”42″: [2,”File Manipulation”,142],”60″: [2,”Endnotes”,205],”41″: [2,”Building Classes with Ruby”,137],”33″: [2,”Working with Perl”,96],”6″: [1,”About the Technical Editor”,16],”0″: [1,”Front Cover”,1],”13″: [1,”Chapter 1 – Introduction to command shell scripting”,26],”54″: [2,”Summary”,184],”84″: [2,”Windows Shell Commands”,280],”20″: [2,”Putting it all together with PowerShell”,54],”16″: [2,”Bash Basics”,33],”68″: [1,”Chapter 8 – Information gathering”,226],”73″: [2,”Putting It All Together”,244],”9″: [2,”Book Overview and Key Learning Points”,20],”27″: [2,”File Manipulation”,79],”75″: [2,”Endnotes”,246],”32″: [2,”Where Perl is Useful”,94],”76″: [1,”Chapter 9 – Exploitation scripting”,248],”48″: [1,”Chapter 5 – Introduction to Web scripting with PHP”,162],”44″: [2,”Network Operations”,149],”28″: [2,”Network Communications”,82],”4″: [1,”Foreword”,12],”77″: [2,”Building Exploits with Python”,248],”67″: [2,”Endnotes”,225],”56″: [2,”Dealing with Execution Policies in PowerShell”,186],”15″: [2,”UNIX, Linux, and OS X Shell Scripting”,30],”5″: [1,”About the Authors”,14],”49″: [2,”Where Web scripting is Useful”,162],”47″: [2,”Endnotes”,160],”66″: [2,”Summary”,224],”26″: [2,”Python Basics”,63],”79″: [2,”Exploiting PHP Scripts”,267],”55″: [1,”Chapter 6 – Manipulating Windows with PowerShell”,186],”90″: [2,”Netmask Basics”,308],”38″: [1,”Chapter 4 – Introduction to Ruby”,124],”12″: [2,”Conclusion”,24],”50″: [2,”Getting Started with PHP”,163],”82″: [1,”Chapter 10 – Post-exploitation scripting”,280],”46″: [2,”Summary”,159],”59″: [2,”Summary”,204],”23″: [1,”Chapter 2 – Introduction to Python”,60],”89″: [1,”Appendix – Subnetting and CIDR addresses”,308],”17″: [2,”Putting It All Together with Bash”,40],”22″: [2,”Endnotes”,58],”37″: [2,”Endnotes”,123],”58″: [2,”PowerShell and Metasploit”,201],”64″: [2,”Nmap”,216],”21″: [2,”Summary”,57],”65″: [2,”Nessus/OpenVAS”,221],”86″: [2,”Scripting Metasploit Meterpreter”,287],”52″: [2,”File Handling and Command Execution”,175],”34″: [2,”Perl Basics”,98],”19″: [2,”PowerShell Basics”,46],”53″: [2,”Putting It All Together”,181],”39″: [2,”Where Ruby is Useful”,124],”85″: [2,”Gathering Network Information”,284],”7″: [1,”Acknowledgments”,18],”74″: [2,”Summary”,246],”3″: [1,”Contents”,6],”69″: [2,”Information Gathering for Penetration Testing”,226],”72″: [2,”Working with Metadata”,237],”43″: [2,”Database Basics”,143],”31″: [1,”Chapter 3 – Introduction to Perl”,94],”70″: [2,”Talking to Google”,230],”81″: [2,”Summary”,278],”88″: [2,”Summary”,305],”1″: [1,”Coding for Penetration Testers: Building Better Tools”,4],”62″: [2,”Working with Scanning Tools”,206],”18″: [2,”Windows Scripting”,43],”61″: [1,”Chapter 7 – Scanner scripting”,206],”11″: [2,”How this Book is Organized”,21],”8″: [1,”Introduction”,20],”2″: [1,”Copyright”,5],”63″: [2,”Netcat”,208],”83″: [2,”Why Post-Exploitation Is Important”,280],”57″: [2,”Penetration Testing uses for PowerShell”,191],”30″: [2,”Endnotes”,93],”91″: [1,”Index”,310]
}[/bookmark]

Related