Penetration Testing with Perl.pdf

(4457 KB) Pobierz
Penetration Testing with Perl
Table of Contents
Penetration Testing with Perl
Credits
About the Author
About the Reviewers
www.PacktPub.com
Support files, eBooks, discount offers, and more
Why subscribe?
Free access for Packt account holders
Preface
What this book covers
What you need for this book
Who this book is for
Conventions
Reader feedback
Customer support
Downloading the example code
Errata
Piracy
Questions
1. Perl Programming
Files
Regular expressions
Literals versus metacharacters
Quantifiers
Anchors
Character classes
Ranged character classes
Grouping text (strings)
Backreferences
Perl string functions and operators
The Perl m// matching operator
The Perl s/// substitution operator
Regular expressions and the split() function
Regular expressions and the grep() function
CPAN Perl modules
CPAN minus
Summary
2. Linux Terminal Output
Built-in bash commands
Variable expansion, grouping, and arguments
Script execution from bash
Input/output streams
Output to files
Input redirection
Output to an input stream
Error handling with the shell
Basic bash programming
Forking processes in the shell
Killing runaway forked processes
Bash command execution from Perl
Summary
3. IEEE 802.3 Wired Network Mapping with Perl
Footprinting
Internet footprinting
Common tools for scanning
Address Resolution Protocol scanning tools
Server Message Block information tools
Internet Control Message Protocol versus Transmission Control Protocol versus
ARP discovery
Designing our own live host scanner
Designing our own port scanner
Writing an SMB scanner
Banner grabbing
A brute force application
Summary
4. IEEE 802.3 Wired Network Manipulation with Perl
Packet capturing
Packet capture filtering
Packet layers
The application layer
MitM
ARP spoofing with Perl
Enabling packet forwarding
Network remapping with packet capture
Summary
5. IEEE 802.11 Wireless Protocol and Perl
802.11 terminologies and packet analysis
Management frames
Control and data frames
Linux wireless utilities
RFMON versus probing
802.11 packet capturing with Perl
802.11 frame headers
Writing an 802.11 protocol analyzer in Perl
Perl and Aircrack-ng
Summary
6. Open Source Intelligence
What’s covered
Google dorks
E-mail address gathering
Using Google for e-mail address gathering
Using social media for e-mail address gathering
Google+
LinkedIn
Facebook
Domain Name Services
The Whois query
The DIG query
Brute force enumeration
Zone transfers
Traceroute
Shodan
More intelligence
Summary
7. SQL Injection with Perl
Web service discovery
Service discovery
File discovery
SQL injection
GET requests
Integer SQL injection
String SQL injection
SQL column counting
MySQL post exploitation
Discovering the column count
Gathering server information
Obtaining table result sets
Obtaining records
Data-driven blind SQL injection
Time-based blind SQL injection
Summary
8. Other Web-based Attacks
Cross-site scripting
The reflected XSS
URL encoding
Zgłoś jeśli naruszono regulamin