Book Image

Penetration Testing with Perl

By : Douglas Berdeaux
Book Image

Penetration Testing with Perl

By: Douglas Berdeaux

Overview of this book

<p>This guide will teach you the fundamentals of penetration testing with Perl, providing an understanding of the mindset of a hacker. In the first few chapters, you will study how to utilize Perl with Linux and the regular expression syntax. After that, you will learn how to use Perl for WAN target analysis, and Internet and external footprinting. You will learn to use Perl for automated web application and site penetration testing. We also cover intelligence gathering techniques from data obtained from footprinting and simple file forensics with file metadata.</p> <p>By the end of this book, you will bring all of your code together into a simple graphical user interface penetration testing framework. Through this guide, you will have acquired the knowledge to apply Perl programming to any penetration testing phase and learn the importance of applying our technique in the methodology and context of the Penetration Testing Execution Standard.</p>
Table of Contents (20 chapters)
Penetration Testing with Perl
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Index

Who is this for?


The PTES breaks the documentation and report down into two sections; one section is for executive, high-level reporting, and the other is for technical reporting. Both sections are targeted for specific audiences and all data should be kept with utmost security and secrecy.

Executive Report

This section of the report should be used for those who are directly impacted by successful penetration results, and those in charge of the security plan within our target client. The PTES outlines the following information:

  • Background

  • Overall Posture

  • Risk Ranking

  • General Findings

  • Recommendation Summary

  • Strategic Roadmap

The Background should list the overall goals that the test is trying to achieve, usually put forth by the target client during the interview and initial agreement processes.

The Posture is mentioned as the "overall effectiveness of the test". This includes found vulnerabilities, which should be discussed at a very high, almost on technical level. An example would be to list that...