Coding for Penetration Testers: Building Better Tools, Second Edition provides readers with an understanding of the scripting languages that are commonly used when developing tools for penetration testing, also guiding users through specific examples of custom tool development and the situations whe
Coding for Penetration Testers
โ Scribed by Andress, Jason;Linn, Ryan
- Publisher
- Syngress
- Year
- 2016
- Tongue
- English
- Leaves
- 447
- Edition
- 2nd edition
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Coding for Penetration Testers: Building Better Tools, Second Edition provides readers with an understanding of the scripting languages that are commonly used when developing tools for penetration testing, also guiding users through specific examples of custom tool development and the situations where such tools might be used. While developing a better understanding of each language, the book presents real-world scenarios and tool development that can be incorporated into a tester's toolkit. This completely updated edition focuses on an expanded discussion on the use of Powershell, and includes practical updates to all tools and coverage. Discusses the use of various scripting languages in penetration testing Presents step-by-step instructions on how to build customized penetration testing tools using Perl, Ruby, Python, and other languages Provides a primer on scripting, including, but not limited to, web scripting, scanner scripting, and exploitation scripting Includes all-new coverage of Powershell.
โฆ Subjects
Computer networks--Security measures;Computer security--Management;Data protection;Information technology--Security measures;Electronic books;Information technology -- Security measures;Computer security -- Management;Computer networks -- Security measures
๐ SIMILAR VOLUMES
Coding for Penetration Testers: Building Better Tools, Second Edition provides readers with an understanding of the scripting languages that are commonly used when developing tools for penetration testing, also guiding users through specific examples of custom tool development and the situations whe
Tools used for penetration testing are often purchased or downloaded from the Internet. Each tool is based on a programming language such as Perl, Python, or Ruby. If a penetration tester wants to extend, augment, or change the functionality of a tool to perform a test differently than the default c
<p>Tools used for penetration testing are often purchased off-the-shelf. Each tool is based on a programming language like Perl, JavaScript, Python, etc. If a penetration tester wants the tool to perform a test differently than the off-the-shelf configuration, he or she must know the basics of codin