Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hands-On Penetration Testing with Python: Enhance your ethical hacking skills to build automated and intelligent systems

Buy

Implement defensive techniques in your ecosystem successfully with Python

Key Features

  • Identify and expose vulnerabilities in your infrastructure with Python
  • Learn custom exploit development
  • Make robust and powerful cybersecurity tools with Python

Book Description

With the current technological and infrastructural shift, penetration testing is no longer a process-oriented activity. Modern-day penetration testing demands intensive automation and innovation, and Python is at the forefront. Given the huge number of tools written in Python and its popularity in the penetration testing space, this language has always been the first choice for penetration testers.

Hands-On Penetration Testing with Python starts by taking you through advanced Python programming constructs. Once you are familiar with the core concepts, you'll explore advanced uses of Python in the domain of penetration testing and optimization. You'll then move on to understanding how Python, data science, and the cybersecurity ecosystem communicate with one another. In the concluding chapters, you'll get up to speed with exploit development, reverse engineering, and cybersecurity use cases that can be automated with Python.

By the end of this book, you'll have the skills you need to leverage Python for pentesting and securing infrastructure, while also creating your own custom exploits.

What you will learn

  • Get to grips with custom vulnerability scanner development
  • Learn web application scanning automation and exploit development
  • Discover everyday cybersecurity scenarios that can be automated with Python
  • Explore enterprise or organization-specific use cases and threat-hunting automation
  • Understand reverse engineering, fuzzing, buffer overflows , key-logger development, and exploit development for buffer overflows
  • Study web scraping in Python and use it for processing web responses
  • Explore security operations center (SOC) use cases

Who this book is for

If you are a security consultant, developer or a cyber security enthusiast who wants in-depth insights into how the pentesting ecosystem and Python combine to create offensive tools and exploits, and automate cyber security use-cases, this book is for you. Prior knowledge of Python is not required

Table of Contents

  1. Introduction to Python
  2. Building Python Scripts
  3. Concept Handling
  4. Advanced Python Modules
  5. Vulnerability Scanner Python - Part 1
  6. Vulnerability Scanner Python - Part 2
  7. Machine Learning and Cyber Security
  8. Automating Web Application Scanning - Part 1
  9. Automated Web Application Scanning - Part 2
  10. Building a Custom Crawler
  11. Reverse-Engineering Linux Applications
  12. Reverse Engineering Windows Applications
  13. Exploit Development
  14. Cyber Threat Intelligence
  15. Other Wonders of Python
  16. Assessments
(HTML tags aren't allowed.)

Python Projects for Beginners: A Ten-Week Bootcamp Approach to Python Programming
Python Projects for Beginners: A Ten-Week Bootcamp Approach to Python Programming

Immerse yourself in learning Python and introductory data analytics with this book’s project-based approach. Through the structure of a ten-week coding bootcamp course, you’ll learn key concepts and gain hands-on experience through weekly projects.

Each chapter in this book is presented as a full week of...

Security for Software Engineers
Security for Software Engineers

Security for Software Engineers is designed to introduce security concepts to undergraduate software engineering students. The book is divided into four units, each targeting activities that a software engineer will likely be involved in within industry.

The book explores the key areas of attack...

Implementing an Information Security Management System: Security Management Based on ISO 27001 Guidelines
Implementing an Information Security Management System: Security Management Based on ISO 27001 Guidelines

Discover the simple steps to implementing information security standards using ISO 27001, the most popular information security standard across the world. You’ll see how it offers best practices to be followed, including the roles of all the stakeholders at the time of security framework implementation,...


C++ Concurrency in Action
C++ Concurrency in Action
Summary

This bestseller has been updated and revised to cover all the latest changes to C++ 14 and 17! C++ Concurrency in Action, Second Edition teaches you everything you need to write robust and elegant multithreaded applications in C++17.

Purchase of the print book includes a free eBook in
...
The Object-Oriented Thought Process (5th Edition) (Developer's Library)
The Object-Oriented Thought Process (5th Edition) (Developer's Library)

Object-oriented programming (OOP) is the foundation of modern programming languages, including C++, Java, C#, Visual Basic .NET, Ruby, Objective-C, and Swift. Objects also form the basis for many web technologies such as JavaScript, Python, and PHP.

 

...
Hands On Google Cloud SQL and Cloud Spanner: Deployment, Administration and Use Cases with Python
Hands On Google Cloud SQL and Cloud Spanner: Deployment, Administration and Use Cases with Python
Discover the methodologies and best practices for getting started with Google Cloud Platform relational services – CloudSQL and CloudSpanner.

The book begins with the basics of working with the Google Cloud Platform along with an introduction to the database technologies available for developers from Google
...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy