Why Security Professionals Love PERL
Nearly everything in Linux is represented as a file and most of them are simple text files. Perl is extremely adept at reading, manipulating, and extraction data from text files. Join Chris as he shares his insights into the Perl programming language. See how it allows you to write shell scripting commands for ethical hacking tasks and can be a vital tool in reconnaissance and penetration testing. Perl is a masterful tool for regular expressions, or regex, and this opens up the ability to find patterns of information in many applications like databases, web servers, and email systems. Whether you're working in a Linux or Windows environment, Perl is an easy to obtain yet powerful tool for your ethical hacking arsenal. Nearly every Linux distribution comes with a Perl interpreter and Kali, the PenTester's distribution of choice, is no exception. Don't worry Microsoft Window's users, there is a free downloadable version of Perl for Windows as well.
Chris Penick is CISSP certified and has been a consultant and CISSP trainer in the technology industry for the past 20 years. During that time, he has worked as Principal Learning Consultant for Symantec, webmaster for the FDA, cyber-warfare scenario developer, technical investigator and forensic analyst for a private security firm. His past government clients include all branches of the United States Military, the Department of Commerce, the IRS, the U.S. Custom and Immigration Service, the Executive Office of the President, and state and local governments in Maryland, Michigan, Virginia, and the District of Columbia. His corporate clients include Guess, Inc., EMC, Raytheon, Lockheed Martin, and the Discovery Channel.