Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hands-On Penetration Testing with Python: Enhance your ethical hacking skills to build automated and intelligent systems

Buy

Implement defensive techniques in your ecosystem successfully with Python

Key Features

  • Identify and expose vulnerabilities in your infrastructure with Python
  • Learn custom exploit development
  • Make robust and powerful cybersecurity tools with Python

Book Description

With the current technological and infrastructural shift, penetration testing is no longer a process-oriented activity. Modern-day penetration testing demands intensive automation and innovation, and Python is at the forefront. Given the huge number of tools written in Python and its popularity in the penetration testing space, this language has always been the first choice for penetration testers.

Hands-On Penetration Testing with Python starts by taking you through advanced Python programming constructs. Once you are familiar with the core concepts, you'll explore advanced uses of Python in the domain of penetration testing and optimization. You'll then move on to understanding how Python, data science, and the cybersecurity ecosystem communicate with one another. In the concluding chapters, you'll get up to speed with exploit development, reverse engineering, and cybersecurity use cases that can be automated with Python.

By the end of this book, you'll have the skills you need to leverage Python for pentesting and securing infrastructure, while also creating your own custom exploits.

What you will learn

  • Get to grips with custom vulnerability scanner development
  • Learn web application scanning automation and exploit development
  • Discover everyday cybersecurity scenarios that can be automated with Python
  • Explore enterprise or organization-specific use cases and threat-hunting automation
  • Understand reverse engineering, fuzzing, buffer overflows , key-logger development, and exploit development for buffer overflows
  • Study web scraping in Python and use it for processing web responses
  • Explore security operations center (SOC) use cases

Who this book is for

If you are a security consultant, developer or a cyber security enthusiast who wants in-depth insights into how the pentesting ecosystem and Python combine to create offensive tools and exploits, and automate cyber security use-cases, this book is for you. Prior knowledge of Python is not required

Table of Contents

  1. Introduction to Python
  2. Building Python Scripts
  3. Concept Handling
  4. Advanced Python Modules
  5. Vulnerability Scanner Python - Part 1
  6. Vulnerability Scanner Python - Part 2
  7. Machine Learning and Cyber Security
  8. Automating Web Application Scanning - Part 1
  9. Automated Web Application Scanning - Part 2
  10. Building a Custom Crawler
  11. Reverse-Engineering Linux Applications
  12. Reverse Engineering Windows Applications
  13. Exploit Development
  14. Cyber Threat Intelligence
  15. Other Wonders of Python
  16. Assessments
(HTML tags aren't allowed.)

SIP Trunking
SIP Trunking

The first complete guide to planning, evaluating, and implementing high-value SIP trunking solutions

 

Most large enterprises have switched to IP telephony, and service provider backbone networks have largely converted to VoIP transport. But there’s a...

Keywords in Radical Philosophy and Education (Critical Understanding in Education)
Keywords in Radical Philosophy and Education (Critical Understanding in Education)
While education is an inherently political field and practice, and while the political struggles that radical philosophy takes up necessarily involve education, there remains much to be done at the intersection of education and radical philosophy. That so many intense political struggles today actually center educational processes and...
Why Great Leaders Don't Take Yes for an Answer: Managing for Conflict and Consensus
Why Great Leaders Don't Take Yes for an Answer: Managing for Conflict and Consensus

Harvard Business School's Michael Roberto draws on powerful decision-making case studies from every walk of life, showing how to promote honest, constructive dissent and skepticism; use it to improve decisions; and align organizations behind those decisions.  Learn...


Java™ How to Program, Sixth Edition
Java™ How to Program, Sixth Edition
Extensively revised for the latest Java (J2SE 5.0) release; Deitel Java How to Program, 6/e now includes earlier coverage of objects; new and streamlined case studies; and OPTIONAL GUI and graphics sections.  Now available in a briefer version (ch. 1-10) called Small Java. SafariX version available.

Welcome to Java and Java How to
...
The Digital Party: Political Organisation and Online Democracy (Digital Barricades)
The Digital Party: Political Organisation and Online Democracy (Digital Barricades)
From the Pirate Parties in Northern Europe to Podemos in Spain and the 5-Star Movement in Italy, from the movements behind Bernie Sanders in the United States and Jeremy Corbyn in the United Kingdom, to Jean-Luc Melenchon's presidential bid in France, the last decade has witnessed the rise of a new blueprint for political...
Climates, Landscapes, and Civilizations
Climates, Landscapes, and Civilizations

Published by the American Geophysical Union as part of the Geophysical Monograph Series, Volume 198.

Climates, Landscapes, and Civilizations brings together a collection of studies on the history of complex interrelationships between humans and their environment by integrating Earth science with archeology and
...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy