|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
SCIDIR_ocn756489902 |
003 |
OCoLC |
005 |
20231117044628.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
111010s2011 maua o 000 0 eng d |
040 |
|
|
|a OPELS
|b eng
|e pn
|c OPELS
|d OCLCQ
|d AU@
|d CDX
|d IDEBK
|d MYG
|d TEFOD
|d TEF
|d TEFOD
|d OCLCQ
|d ZZAND
|d OCLCQ
|d OCLCF
|d U3W
|d OTZ
|d WYU
|d LEAUB
|d OL$
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 761961650
|a 778615709
|a 916427153
|
020 |
|
|
|a 9781597497305
|q (electronic bk.)
|
020 |
|
|
|a 1597497304
|q (electronic bk.)
|
020 |
|
|
|z 9781597497299
|q (pbk.)
|
020 |
|
|
|z 1597497290
|q (pbk.)
|
035 |
|
|
|a (OCoLC)756489902
|z (OCoLC)761961650
|z (OCoLC)778615709
|z (OCoLC)916427153
|
050 |
|
4 |
|a QA76.9.A25
|b A5454 2011eb
|
072 |
|
7 |
|a UR
|2 bicssc
|
082 |
0 |
4 |
|a 005.8
|2 23
|
100 |
1 |
|
|a Andress, Jason.
|
245 |
1 |
0 |
|a Coding for penetration testers :
|b building better tools /
|c Jason Andress, Ryan Linn.
|
260 |
|
|
|a Boston :
|b Syngress,
|c 2011.
|
300 |
|
|
|a 1 online resource (xxiv, 295 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
520 |
|
|
|a Tools used for penetration testing are often purchased or downloaded from the Internet. Each tool is based on a programming language such as Perl, Python, or Ruby. If a penetration tester wants to extend, augment, or change the functionality of a tool to perform a test differently than the default configuration, the tester must know the basics of coding for the related programming language. Coding for Penetration Testers provides the reader with an understanding of the scripting languages that are commonly used when developing tools for penetration testing. It also guides the reader through specific examples of custom tool development and the situations where such tools might be used. While developing a better understanding of each language, the reader is guided through real-world scenarios and tool development that can be incorporated into a tester's toolkit. Discusses the use of various scripting languages in penetration testing Presents step-by-step instructions on how to build customized penetration testing tools using Perl, Ruby, Python, and other languages Provides a primer on scripting including, but not limited to, Web scripting, scanner scripting, and exploitation scripting.
|
505 |
0 |
|
|a Foreword / by Ed Skoudis -- Introduction -- Introduction to Command Shell Scripting -- Introduction to Python -- Introduction to Perl -- Introduction to Ruby -- Introduction to Web Scripting with PHP -- Manipulating Windows with PowerShell -- Scanner Scripting -- Information Gathering -- Exploitation Scripting -- Post-Exploitation Scripting -- Appendix. Subnetting and CIDR Addresses.
|
588 |
0 |
|
|a Print version record.
|
650 |
|
0 |
|a Penetration testing (Computer security)
|
650 |
|
0 |
|a Computer networks
|x Security measures
|x Testing.
|
650 |
|
6 |
|a Tests d'intrusion.
|0 (CaQQLa)000274128
|
650 |
|
7 |
|a Penetration testing (Computer security)
|2 fast
|0 (OCoLC)fst01789566
|
700 |
1 |
|
|a Linn, Ryan.
|
776 |
0 |
8 |
|i Print version:
|a Andress, Jason.
|t Coding for penetration testers.
|d Boston : Syngress, 2011
|z 9781597497299
|w (DLC) 2011029098
|w (OCoLC)730403721
|
856 |
4 |
0 |
|u https://sciencedirect.uam.elogim.com/science/book/9781597497299
|z Texto completo
|