Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
Image of Coding for penetration testers: building better tools
Bookmark Share

Text

Coding for penetration testers: building better tools

Andress, Jason - Personal Name; Linn, Ryan - Personal Name;

Table of Contents

1. Intro to Command Shell Scripting
- Information in this Chapter
- On Shell Scripting
- UNIX, Linux, and OS X Shell Scripting
- Bash Basics
- Putting It All Together with Bash
- Windows Scripting
- PowerShell Basics
- Putting it all together with PowerShell

2. Intro to Python
- Information in this Chapter
- What is Python?
- Where is Python Useful?
- Python Basics
- File Manipulation
- Network Communications

3. Intro to Perl
- Information in this Chapter
- Where Perl is Useful
- Working with Perl
- Perl Basics
- Putting It All together

4. Intro to Ruby
- Information in this Chapter
- Where Ruby is Useful
- Ruby Basics
- Building Classes with Ruby
- File Manipulation
- Database Basics
- Network Operations
- Putting It All Together

5. Intro to Web Scripting with PHP
- Information in this Chapter
- Where Web scripting is Useful
- Getting Started with PHP
- Handling Forms with PHP
- File Handling and Command Execution
- Putting It All Together

6. Manipulating Windows with Powershell
- Information in this Chapter
- Dealing with Execution Policies in PowerShell
- Penetration Testing uses for PowerShell
- PowerShell and Metasploit

7. Scanner Scripting
- Information in this Chapter
- Working with Scanning Tools
- Netcat
- Nmap
- Nessus/OpenVAS

8. Information Gathering
- Information in this Chapter
- Information Gathering for Penetration Testing
- Talking to Google
- Web Automation with Perl
- Working with Metadata

9. Exploitation Scripting
- Information in this Chapter
- Building Exploits with Python
- Creating Metasploit Exploits
- Exploiting PHP Scripts
- Cross-Site Scripting

10. Post-Exploitation Scripting
- Information in this Chapter
- Why Post-Exploitation Is Important
- Windows Shell Commands
- Gathering Network Information
- Scripting Metasploit Meterpreter
- Database Post-Exploitation


Availability
#
Perpustakaan Poltek SSN (Rak 000) 005.8 AND c
b0001370
Available - Available
Detail Information
Series Title
--
Call Number
005.8 AND c
Publisher
Massachusetts : Syngress., 2012
Collation
xxiv, 295 hal.; ilus.; 24 cm
Language
English
ISBN/ISSN
9781597497299
Classification
005.8
Content Type
-
Media Type
-
Carrier Type
-
Edition
1st edition
Subject(s)
Penetration testing (Computer security)
Computer networks -- Security measures
Specific Detail Info
--
Statement of Responsibility
Jason Andress and Ryan Linn
Other version/related

No other version available

File Attachment
No Data
Comments

You must be logged in to post a comment

Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?