Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hands-On Penetration Testing with Python: Enhance your ethical hacking skills to build automated and intelligent systems

Buy

Implement defensive techniques in your ecosystem successfully with Python

Key Features

  • Identify and expose vulnerabilities in your infrastructure with Python
  • Learn custom exploit development
  • Make robust and powerful cybersecurity tools with Python

Book Description

With the current technological and infrastructural shift, penetration testing is no longer a process-oriented activity. Modern-day penetration testing demands intensive automation and innovation, and Python is at the forefront. Given the huge number of tools written in Python and its popularity in the penetration testing space, this language has always been the first choice for penetration testers.

Hands-On Penetration Testing with Python starts by taking you through advanced Python programming constructs. Once you are familiar with the core concepts, you'll explore advanced uses of Python in the domain of penetration testing and optimization. You'll then move on to understanding how Python, data science, and the cybersecurity ecosystem communicate with one another. In the concluding chapters, you'll get up to speed with exploit development, reverse engineering, and cybersecurity use cases that can be automated with Python.

By the end of this book, you'll have the skills you need to leverage Python for pentesting and securing infrastructure, while also creating your own custom exploits.

What you will learn

  • Get to grips with custom vulnerability scanner development
  • Learn web application scanning automation and exploit development
  • Discover everyday cybersecurity scenarios that can be automated with Python
  • Explore enterprise or organization-specific use cases and threat-hunting automation
  • Understand reverse engineering, fuzzing, buffer overflows , key-logger development, and exploit development for buffer overflows
  • Study web scraping in Python and use it for processing web responses
  • Explore security operations center (SOC) use cases

Who this book is for

If you are a security consultant, developer or a cyber security enthusiast who wants in-depth insights into how the pentesting ecosystem and Python combine to create offensive tools and exploits, and automate cyber security use-cases, this book is for you. Prior knowledge of Python is not required

Table of Contents

  1. Introduction to Python
  2. Building Python Scripts
  3. Concept Handling
  4. Advanced Python Modules
  5. Vulnerability Scanner Python - Part 1
  6. Vulnerability Scanner Python - Part 2
  7. Machine Learning and Cyber Security
  8. Automating Web Application Scanning - Part 1
  9. Automated Web Application Scanning - Part 2
  10. Building a Custom Crawler
  11. Reverse-Engineering Linux Applications
  12. Reverse Engineering Windows Applications
  13. Exploit Development
  14. Cyber Threat Intelligence
  15. Other Wonders of Python
  16. Assessments
(HTML tags aren't allowed.)

Complete Guide to Test Automation: Techniques, Practices, and Patterns for Building and Maintaining Effective Software Projects
Complete Guide to Test Automation: Techniques, Practices, and Patterns for Building and Maintaining Effective Software Projects
Rely on this robust and thorough guide to build and maintain successful test automation. As the software industry shifts from traditional waterfall paradigms into more agile ones, test automation becomes a highly important tool that allows your development teams to deliver software at an ever-increasing pace without compromising...
Mastering Predictive Analytics with scikit-learn and TensorFlow: Implement machine learning techniques to build advanced predictive models using Python
Mastering Predictive Analytics with scikit-learn and TensorFlow: Implement machine learning techniques to build advanced predictive models using Python

Learn advanced techniques to improve the performance and quality of your predictive models

Key Features

  • Use ensemble methods to improve the performance of predictive analytics models
  • Implement feature selection, dimensionality reduction, and cross-validation...
Carrier Grade Voice Over IP (second edition)
Carrier Grade Voice Over IP (second edition)
NEW EDITION OF---CUTTING-EDGE SOLUTIONS CUT-TO-THE-CHASE STYLE

In the race to put carrier-quality voice over IP (VoIP)——those using this book run faster and falter less. International expert Daniel Collins’ greatly enhanced Carrier Grade Voice over IP brings you leading-edge signaling schemes,...


Learn JavaScript In a Weekend, Second Edition
Learn JavaScript In a Weekend, Second Edition

Learn JavaScript In a Weekend, 2nd Edition is the ultimate guide to integrating JavaScript into Web pages. With step-by-step instructions, readers will learn how to effectively use JavaScript, the most popular scripting language used for Web development today. Setting itself apart from competitors, this is the only beginner-level...

Complex Systems and Computational Biology Approaches to Acute Inflammation
Complex Systems and Computational Biology Approaches to Acute Inflammation

The difficulty in achieving effective translation of basic mechanistic biomedical knowledge into effective therapeutics, is the greatest challenge in biomedical research. Nowhere is this more apparent than in the reductionist approaches to understanding and manipulating the acute inflammatory response in the settings of sepsis,...

Silicon Nanoelectronics
Silicon Nanoelectronics
Because the silicon process infrastructure is already in place and because of silicon's compatibility with current CMOS circuits, silicon nanodevices are positioned to become particularly important. Silicon Nanoelectronics examines recent developments of novel devices and materials that hold great promise for creating smaller and more powerful...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy