O'Reilly logo

Penetration Testing with Perl by Swizec Teller

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

In this chapter, we learned a great deal about how we can use Perl in conjunction with our Wi-Fi adapter to disassemble 802.11 traffic. As more and more institutions are adopting 802.11 networks, this skill become increasingly important to have. In the next chapter, we will be learning how to use Perl to automate some tasks during our WAN Internet footprinting phase of proper OSINT, and use the gathered information to test for WAN-accessible application attacks.

In the next chapter, we will have a detailed preliminary discussion on WAN and web topology and terminologies.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required