O'Reilly logo

Penetration Testing with Perl by Swizec Teller

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8. Other Web-based Attacks

There are many methods using which we can exploit weaknesses in web applications. In this chapter, we will look at how we can use Perl to automate web application vulnerability discovery for cross-site scripting and file inclusion attacks. We will also be learning how we can effectively exploit these vulnerabilities with a little help from social engineering. Then, we move on to content management systems and how potential vulnerabilities can be discovered with simple Perl programs that utilize online resources for updated exploits. During this, we will cover how to handle different HTTP responses using LWP::UserAgent and how we can creatively use this skill to find more information from our client victim's servers. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required