O'Reilly logo

Penetration Testing with Perl by Swizec Teller

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 3. IEEE 802.3 Wired Network Mapping with Perl

In this chapter, we will be writing our first footprinting and fingerprinting intelligence discovery tools in Perl. As mentioned in the previous chapters, a few tools come with default installations of Linux, and a lot of others are easily accessible via the distribution's precompiled package management repositories. We will analyze the traffic with Wireshark and mimic the behavior of a few of these tools using only Perl and Perl modules from CPAN. If you haven't used CPAN modules before, it's best to look back at Chapter 1, Perl Programming, to learn how they are installed.

In this chapter, we will be covering the following topics:

  • Different footprinting techniques
  • Different scanning techniques ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required