Skip to content

Coding for Penetration Testers Building Better Tools

Best in textbook rentals since 2012!

ISBN-10: 1597497290

ISBN-13: 9781597497299

Edition: 2012

Authors: Jason Andress, Ryan Linn

List price: $27.99
Blue ribbon 30 day, 100% satisfaction guarantee!
Rent eBooks
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Customers also bought

Book details

List price: $27.99
Copyright year: 2012
Publisher: Elsevier Science & Technology Books
Publication date: 11/4/2011
Binding: Paperback
Pages: 320
Size: 7.50" wide x 9.25" long x 1.00" tall
Weight: 1.430
Language: English

Jason Andress (ISSAP, CISSP, GPEN, CEH) is a seasoned security professional with a depth of experience in both the academic and business worlds. Presently he carries out information security oversight duties, performing penetration testing, risk assessment, and compliance functions to ensure that critical assets are protected. Jason has taught undergraduate and graduate security courses since 2005 and holds a doctorate in computer science, researching in the area of data protection. He has authored several publications and books, writing on topics including data security, network security, penetration testing, and digital forensics.

Ryan Linn (OSCE, GPEN, GWAPT) is a penetration tester, an author, a developer, and an educator. He comes from a systems administation and Web application development background, with many years of IT security experience. Ryan currently works as a full-time penetration tester and is a regular contributor to open source projects including Metasploit, The Browser Exploitation Framework, and the Dradis Framework. He has spoken at numerous security conferences and events, including ISSA, DEF CON, SecTor, and CarolinaCon.

Foreword
Introduction
Introduction to Command Shell Scripting
Introduction to Python
Introduction to Perl
Introduction to Ruby
Introduction to Web Scripting with PHP
Manipulating Windows with PowerShell
Scanner Scripting
Information Gathering
Exploitation Scripting
Post-Exploitation Scripting
Appendix: Subnetting and CIDR Addresses