O'Reilly logo

Penetration Testing with Perl by Swizec Teller

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

Even though social engineering has a vast amount of physical security and physical penetration testing aspects, much of the digital social engineering logistics can be handled with our mighty little friend, Perl. This chapter wraps up our entire attack for the penetration test as we have passed through a great amount of vectors and phases listed within the technical guidelines of the PTES. In the next chapter, we will discuss the reporting section of the PTES and how we can generate different types of reporting, including PDF files, from our information obtained during the penetration test using Perl.

In the next chapter, we move on to the reporting phase of the penetration test. Here, we will learn how to use Perl to create graphs and ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required