Book Image

Penetration Testing with Perl

By : Douglas Berdeaux
Book Image

Penetration Testing with Perl

By: Douglas Berdeaux

Overview of this book

<p>This guide will teach you the fundamentals of penetration testing with Perl, providing an understanding of the mindset of a hacker. In the first few chapters, you will study how to utilize Perl with Linux and the regular expression syntax. After that, you will learn how to use Perl for WAN target analysis, and Internet and external footprinting. You will learn to use Perl for automated web application and site penetration testing. We also cover intelligence gathering techniques from data obtained from footprinting and simple file forensics with file metadata.</p> <p>By the end of this book, you will bring all of your code together into a simple graphical user interface penetration testing framework. Through this guide, you will have acquired the knowledge to apply Perl programming to any penetration testing phase and learn the importance of applying our technique in the methodology and context of the Penetration Testing Execution Standard.</p>
Table of Contents (20 chapters)
Penetration Testing with Perl
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Index

Chapter 9. Password Cracking

Perl isn't the normal go-to language for password cracking since it is slower than C or other lower-level compiled languages when using complex password hashing algorithms. However, password cracking can be done and we will explore methods of how to do so, and even a few methods of optimization. In this chapter, we will look at ways in which we can use Perl to crack password hashes obtained from penetration testing, including SHA1, salted SHA1, MD5, salted MD5, and a few others. After this, we will analyze how we can crack our WPA2 CCMP handshake that we obtained in Chapter 5, IEEE 802.11 Wireless Protocol and Perl. Both types of password cracking will use a simple brute force offline dictionary attack method, so we start the chapter off by introducing ourselves to Digital Credential Analysis, which will help us to construct targeted dictionary files.