Penetration Testing with Perl

· Packt Publishing Ltd
3.0
1 review
Ebook
332
Pages

About this ebook

If you are an expert Perl programmer interested in penetration testing or information security, this guide is designed for you. However, it will also be helpful for you even if you have little or no Linux shell experience.

Ratings and reviews

3.0
1 review
Sébastien Nadeau
March 18, 2015
The author nonetheless succeeds in transfering his network security techniques in this book. Far from being perfect, but still a good reference, this book makes great bathroom reading. Working on the other side of the fence, it's always good to have a clue of what's going out in the wild in order to be able to respond to it. I discovered tricks in this book that will help me strenghten my systems. Packt gives a chance to new authors to take some experience. The sometimes harsh critics can be taken as opportunities to do things better in the future. There's still plenty of material out there to write another tome of this book while seriously considering reviewers advices.
1 person found this review helpful

About the author

Douglas Berdeaux is a web programmer for a university located in Pittsburgh, PA, USA. He founded WeakNet Laboratories in 2007, which is a computer and network lab environment primarily used for Wi-Fi security exploration. Using WeakNet Labs, he designed the Wi-Fi-security-themed WEAKERTH4N Blue Ghost Linux distribution, the WARCARRIER 802.11 analysis tool, the pWeb Perl suite for web application penetration testing, the shield DB SQL RDBMS, several Android applications, and even Nintendo DS games and emulation software. He also designed and developed hardware devices used to control ProjectMF VoIP and antique telephony switching hardware. In his free time, Douglas is a musician and enjoys playing video games and spending time with his birds and bunnies. He has written Raiding the Wireless Empire, CreateSpace Independent Publishing Platform, and is in the process of writing Raiding the Internet Oceans—these are two self-published technical books that possess the exciting and strange life of a hacker, Seadog. He has also written Regular Expressions: Simplicity and Power in Code, CreateSpace Independent Publishing Platform, which is a technical guide to the power of regular expressions and how they can be applied in programming and scripting. Besides books, he has also published many articles in information security magazines, including 2600: The Hacker Quarterly, PenTest Magazine, Sun/Oracle BigAdmin, and Hakin9 IT Security Magazine.

Reading information

Smartphones and tablets
Install the Google Play Books app for Android and iPad/iPhone. It syncs automatically with your account and allows you to read online or offline wherever you are.
Laptops and computers
You can listen to audiobooks purchased on Google Play using your computer's web browser.
eReaders and other devices
To read on e-ink devices like Kobo eReaders, you'll need to download a file and transfer it to your device. Follow the detailed Help Center instructions to transfer the files to supported eReaders.