Text
Coding for penetration testers: building better tools
Table of Contents
1. Intro to Command Shell Scripting
- Information in this Chapter
- On Shell Scripting
- UNIX, Linux, and OS X Shell Scripting
- Bash Basics
- Putting It All Together with Bash
- Windows Scripting
- PowerShell Basics
- Putting it all together with PowerShell
2. Intro to Python
- Information in this Chapter
- What is Python?
- Where is Python Useful?
- Python Basics
- File Manipulation
- Network Communications
3. Intro to Perl
- Information in this Chapter
- Where Perl is Useful
- Working with Perl
- Perl Basics
- Putting It All together
4. Intro to Ruby
- Information in this Chapter
- Where Ruby is Useful
- Ruby Basics
- Building Classes with Ruby
- File Manipulation
- Database Basics
- Network Operations
- Putting It All Together
5. Intro to Web Scripting with PHP
- Information in this Chapter
- Where Web scripting is Useful
- Getting Started with PHP
- Handling Forms with PHP
- File Handling and Command Execution
- Putting It All Together
6. Manipulating Windows with Powershell
- Information in this Chapter
- Dealing with Execution Policies in PowerShell
- Penetration Testing uses for PowerShell
- PowerShell and Metasploit
7. Scanner Scripting
- Information in this Chapter
- Working with Scanning Tools
- Netcat
- Nmap
- Nessus/OpenVAS
8. Information Gathering
- Information in this Chapter
- Information Gathering for Penetration Testing
- Talking to Google
- Web Automation with Perl
- Working with Metadata
9. Exploitation Scripting
- Information in this Chapter
- Building Exploits with Python
- Creating Metasploit Exploits
- Exploiting PHP Scripts
- Cross-Site Scripting
10. Post-Exploitation Scripting
- Information in this Chapter
- Why Post-Exploitation Is Important
- Windows Shell Commands
- Gathering Network Information
- Scripting Metasploit Meterpreter
- Database Post-Exploitation
No other version available