Coverart for item
The Resource Coding for Penetration Testers : Building Better Tools

Coding for Penetration Testers : Building Better Tools

Label
Coding for Penetration Testers : Building Better Tools
Title
Coding for Penetration Testers
Title remainder
Building Better Tools
Creator
Contributor
Language
eng
Cataloging source
MiAaPQ
Literary form
non fiction
Nature of contents
dictionaries
Coding for Penetration Testers : Building Better Tools
Label
Coding for Penetration Testers : Building Better Tools
Link
http://libproxy.rpi.edu/login?url=https://ebookcentral.proquest.com/lib/rpi/detail.action?docID=4675472
Publication
Copyright
Related Contributor
Related Location
Related Agents
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • Front Cover -- Coding for Penetration Testers -- Copyright Page -- Dedication -- Contents -- About the Authors -- 0 Introduction -- Book Overview and Key Learning Points -- Book Audience -- How This Book is Organized -- Chapter 1: Introduction to Command Shell Scripting -- Chapter 2: Introduction to Python -- Chapter 3: Introduction to Perl -- Chapter 4: Introduction to Ruby -- Chapter 5: Introduction to Web Scripting With PHP -- Chapter 6: Manipulating Windows With PowerShell -- Chapter 7: Scanner Scripting -- Chapter 8: Information Gathering -- Chapter 9: Exploitation Scripting -- Chapter 10: Postexploitation Scripting -- Conclusion -- 1 Introduction to command shell scripting -- On Shell Scripting -- What Is a Shell? -- What Is a Script? -- Shell Scripts -- Where Shell Scripting Is Useful? -- UNIX, Linux, and OS X Shell Scripting -- Shell Availability and Choices -- C-shell-compatible shells -- Bourne-compatible shells -- Other UNIX-like shells -- Working With Shells -- Bash Basics -- Hello World -- Variables -- Arguments -- Control statements -- Conditionals -- Looping -- Putting It All Together With Bash -- Adding /dev/tcp/support to Bash -- Building a Port Scanner With Bash -- Improving the Script -- Windows Scripting -- Shell Availability and Choices -- Command.com and CMD.exe -- Batch files -- PowerShell -- Cygwin -- Other Shells -- PowerShell Basics -- Hello World -- Variables -- Arguments -- Control Statements -- Conditionals -- Introducing the Windows Management Interface -- Looping -- Putting It All Together With PowerShell -- Building a Port Scanner With PowerShell -- Improving the Script -- Summary -- References -- 2 Introduction to Python -- What Is Python? -- Where Do We Get Python? -- Where Is Python Useful? -- Multiplatform Scripting -- Network Scripting -- Extensive Modules -- Reusable Code That Is Easy to Create
  • Python Basics -- Getting Started -- Formatting Python files -- Running Python files -- Variables -- Modules -- Arguments -- Lists -- Dictionaries -- Control Statements -- If statements -- Loops -- Functions -- File Manipulation -- Exception Handling -- Network Communications -- Client Communications -- Server Communications -- Scapy -- Summary -- References -- 3 Introduction to Perl -- Introduction -- Where Perl Is Useful -- Handling Text -- Gluing Applications Together -- Working With Perl -- Editing Tools -- Extending Perl scripts -- Compiling Perl scripts -- Graphical User Interfaces in Perl -- Perl Basics -- Hello World -- Variables -- Shell Commands -- Arguments -- Control Statements -- Conditionals -- Looping -- Regular Expressions -- File Input and Output -- Putting It All Together -- Building an SNMP Scanner With Perl -- Improving the Script -- Summary -- References -- 4 Introduction to Ruby -- Introduction -- Where Ruby Is Useful -- Ruby Basics -- Variables -- Symbols -- Constants, integers, and floats -- Arrays and hashes -- Control statements -- Functions -- Building Classes With Ruby -- Building a Class -- Extending a Class -- Accessing Class Data -- File Manipulation -- Database Basics -- Using DBI -- Using Active Record -- Network Operations -- Client Communications -- Server Communications -- Putting It All Together -- Summary -- References -- 5 Introduction to web scripting with PHP -- Introduction -- Where Web scripting Is Useful -- Getting Started With PHP -- Scope -- PHP Basics -- Variables -- Output -- Control Statements -- Functions -- Handling Forms With PHP -- File Handling and Command Execution -- File Handling -- Command Execution -- Putting It All Together -- Summary -- 6 Manipulating Windows with PowerShell -- Dealing With Execution Policies in PowerShell -- Execution Policies -- Bypassing the Policies -- Getting In
  • Setting Up a Windows 10 System -- Penetration Testing Uses for PowerShell -- Controlling Processes and Services -- Interfacing With the Event Logs -- Getting and Sending Files Over the Network -- Interfacing With the Registry -- PowerShell and Metasploit -- Customizing Invoke-Shellcode -- Putting It All Together -- Summary -- References -- 7 Scanner scripting -- Introduction -- Working With Scanning Tools -- Netcat -- Nmap -- Nessus/OpenVAS -- Netcat -- Implementations of Netcat -- Netcat variants -- Simple Netcat Usage -- Building a Web Server With Netcat -- Transferring Files With Netcat -- Nmap -- Working With Service Probes in Nmap -- The NSE -- Building Nmap NSE Files -- Nessus/OpenVAS -- NASL in Nessus and OpenVAS -- Nessus Attack Scripting Language -- Summary -- References -- 8 Information gathering -- Introduction -- Information Gathering for Penetration Testing -- Sources of Information -- Patterns in Information -- Metadata -- What Can We Do With the Information? -- Talking to Google -- Google Hacking -- Advanced Operators -- Automating Google Discovery -- Web Automation With Perl -- Pulling Information From Websites -- WWW::Mechanize -- Working With Metadata -- Finding Metadata -- Document Metadata -- Metadata in Media Files -- Putting It All Together -- Summary -- References -- 9 Exploitation scripting -- Introduction -- Building Exploits With Python -- Setting Up -- Setting Up Debugging -- Causing Our First Crash -- Using pattern_offset -- Controlling EIP -- Adding Shellcode -- Getting Our Shell -- Creating Metasploit Exploits -- Starting a Template -- Porting the Exploit Code -- Executing the Exploit -- Exploiting PHP Scripts -- Remote File Inclusion -- What is RFI? -- Exploiting Autonomous LAN Party -- Using Metasploit to exploit RFI -- Command Execution Vulnerabilities -- Finding command execution vulnerabilities
  • Cross-Site Scripting -- What is XSS? -- Exploiting XSS -- Summary -- 10 Postexploitation scripting -- Introduction -- Why Postexploitation Is Important? -- Windows Shell Commands -- User Management -- Listing Users and Groups -- Adding Users and Groups -- Gathering Network Information -- Windows Network Information Gathering -- Linux Network Information Gathering -- Scripting Metasploit Meterpreter -- Getting a Shell -- Building a Basic Script -- Executing the Script -- Database Postexploitation -- What Is SQLi? -- MySQL -- Authentication bypass -- Returning extra records -- SQLi on Microsoft SQL Server -- Verifying the vulnerability -- Reenabling xp_cmdshell -- Summary -- Index -- Back Cover
http://library.link/vocab/cover_art
https://contentcafe2.btol.com/ContentCafe/Jacket.aspx?Return=1&Type=S&Value=9780128054734&userID=ebsco-test&password=ebsco-test
Dimensions
unknown
http://library.link/vocab/discovery_link
{'f': 'http://opac.lib.rpi.edu/record=b4299955'}
Edition
2nd ed.
Extent
1 online resource (338 pages)
Form of item
online
Isbn
9780128054734
Media category
computer
Media MARC source
rdamedia
Media type code
c
Sound
unknown sound
Specific material designation
remote

Library Locations

    • Folsom LibraryBorrow it
      110 8th St, Troy, NY, 12180, US
      42.729766 -73.682577
Processing Feedback ...