Coding for Penetration Testers

Book PDF Download

Table of Contents

Coding for Penetration Testers: Building Better Tools

Foreword

About the Technical Editor

Acknowledgments

Introduction

Book Overview and Key Learning Points

Book Audience

How this Book is Organized

Conclusion

Chapter 1 - Introduction to command shell scripting

On Shell Scripting

UNIX, Linux, and OS X Shell Scripting

Bash Basics

Putting It All Together with Bash

Windows Scripting

PowerShell Basics

Putting it all together with PowerShell

Summary

Endnotes

Chapter 2 - Introduction to Python

What is Python?

Where is Python Useful?

Python Basics

File Manipulation

Network Communications

Summary

Endnotes

Chapter 3 - Introduction to Perl

Where Perl is Useful

Working with Perl

Perl Basics

Putting It All together

Summary

Endnotes

Chapter 4 - Introduction to Ruby

Where Ruby is Useful

Ruby Basics

Building Classes with Ruby

File Manipulation

Database Basics

Network Operations

Putting It All Together

Summary

Endnotes

Chapter 5 - Introduction to Web scripting with PHP

Where Web scripting is Useful

Getting Started with PHP

Handling Forms with PHP

File Handling and Command Execution

Putting It All Together

Summary

Chapter 6 - Manipulating Windows with PowerShell

Dealing with Execution Policies in PowerShell

Penetration Testing uses for PowerShell

PowerShell and Metasploit

Summary

Endnotes

Chapter 7 - Scanner scripting

Working with Scanning Tools

Netcat

Nmap

Nessus/OpenVAS

Summary

Endnotes

Chapter 8 - Information gathering

Information Gathering for Penetration Testing

Talking to Google

Web Automation with Perl

Working with Metadata

Putting It All Together

Summary

Endnotes

Chapter 9 - Exploitation scripting

Building Exploits with Python

Creating Metasploit Exploits

Exploiting PHP Scripts

Cross-Site Scripting

Summary

Chapter 10 - Post-exploitation scripting

Why Post-Exploitation Is Important

Windows Shell Commands

Gathering Network Information

Scripting Metasploit Meterpreter

Database Post-Exploitation

Summary

Appendix - Subnetting and CIDR addresses

Netmask Basics

Index

SYNGRESS

CoDING FOR
aN eV a eae

Building Better Tools

wy,

SET PAS kat y .

Ryan Linn

Related