Coding for penetration testers

by Jason Andress | 04 November 2011
PAPERBACK
Coding for Penetration Testers discusses the use of various scripting languages in penetration testing. The book presents step-by-step instructions on how to build customized penetration testing tools using Perl, Ruby, Python, and other languages. It also provides a primer on scripting including, but not limited to, Web scripting, scanner scripting, and exploitation scripting. It guides the student through specific examples of custom tool development that can be incorporated into a tester's toolkit as well as real-world scenarios where such tools might be used. This book is divided into 10 chapters that explores topics such as command shell scripting; Python, Perl, and Ruby; Web scripting with PHP; manipulating Windows with PowerShell; scanner scripting; information gathering; exploitation scripting; and post-exploitation scripting. This book will appeal to penetration testers, information security practitioners, and network and system administrators.
€32.47 Was €40.59
97 Reward Points
In stock online
Extended Range: Delivery in 2-3 working days
Free Delivery on this item

Any purchases for more than €10 are eligible for free delivery anywhere in the UK or Ireland!

Coding for Penetration Testers discusses the use of various scripting languages in penetration testing. The book presents step-by-step instructions on how to build customized penetration testing tools using Perl, Ruby, Python, and other languages. It also provides a primer on scripting including, but not limited to, Web scripting, scanner scripting, and exploitation scripting. It guides the student through specific examples of custom tool development that can be incorporated into a tester's toolkit as well as real-world scenarios where such tools might be used. This book is divided into 10 chapters that explores topics such as command shell scripting; Python, Perl, and Ruby; Web scripting with PHP; manipulating Windows with PowerShell; scanner scripting; information gathering; exploitation scripting; and post-exploitation scripting. This book will appeal to penetration testers, information security practitioners, and network and system administrators.
Quantity:
In stock online
Extended Range: Delivery in 2-3 working days
Free Delivery on this item
97 Reward Points

Any purchases for more than €10 are eligible for free delivery anywhere in the UK or Ireland!

€32.47 Was €40.59
In stock online
Extended Range: Delivery in 2-3 working days
Free Delivery on this item
Quantity:
97 Reward Points

Any purchases for more than €10 are eligible for free delivery anywhere in the UK or Ireland!

Product Description

Product Details