O'Reilly logo

Penetration Testing with Perl by Swizec Teller

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

Footprinting and fingerprinting can result in a massive amount of data from the target. This data should be used as we move into different phases of the penetration test, to test vulnerabilities or even for social engineering purposes. Now that we have learned to do some basic footprinting and fingerprinting of live hosts, we can move on to the manipulation of network data using these live host addresses.

Our next chapter will cover just that, network manipulation and man-in-the-middle attacking using Perl programming.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required