Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learning Penetration Testing with Python


Utilize Python scripting to execute effective and efficient penetration tests

About This Book

  • Understand how and where Python scripts meet the need for penetration testing
  • Familiarise yourself with the process of highlighting a specific methodology to exploit an environment to fetch critical data
  • Develop your Python and penetration testing skills with real-world examples

Who This Book Is For

If you are a security professional or researcher, with knowledge of different operating systems and a conceptual idea of penetration testing, and you would like to grow your knowledge in Python, then this book is ideal for you.

What You Will Learn

  • Familiarise yourself with the generation of Metasploit resource files
  • Use the Metasploit Remote Procedure Call (MSFRPC) to automate exploit generation and execution
  • Use Python's Scrapy, network, socket, office, Nmap libraries, and custom modules
  • Parse Microsoft Office spreadsheets and eXtensible Markup Language (XML) data files
  • Write buffer overflows and reverse Metasploit modules to expand capabilities
  • Exploit Remote File Inclusion (RFI) to gain administrative access to systems with Python and other scripting languages
  • Crack an organization's Internet perimeter
  • Chain exploits to gain deeper access to an organization's resources
  • Interact with web services with Python

In Detail

Python is a powerful new-age scripting platform that allows you to build exploits, evaluate services, automate, and link solutions with ease. Python is a multi-paradigm programming language well suited to both object-oriented application development as well as functional design patterns. Because of the power and flexibility offered by it, Python has become one of the most popular languages used for penetration testing.

This book highlights how you can evaluate an organization methodically and realistically. Specific tradecraft and techniques are covered that show you exactly when and where industry tools can and should be used and when Python fits a need that proprietary and open source solutions do not.

Initial methodology, and Python fundamentals are established and then built on. Specific examples are created with vulnerable system images, which are available to the community to test scripts, techniques, and exploits. This book walks you through real-world penetration testing challenges and how Python can help.

From start to finish, the book takes you through how to create Python scripts that meet relative needs that can be adapted to particular situations. As chapters progress, the script examples explain new concepts to enhance your foundational knowledge, culminating with you being able to build multi-threaded security tools, link security tools together, automate reports, create custom exploits, and expand Metasploit modules.

Style and approach

This book is a practical guide that will help you become better penetration testers and/or Python security tool developers. Each chapter builds on concepts and tradecraft using detailed examples in test environments that you can simulate.

(HTML tags aren't allowed.)

Beginning VB.NET 2003
Beginning VB.NET 2003

Three expert authors guide you through the basics of building working applications, creating windows and boxes, handling unexpected events, using object-oriented programming, and more. You’ll learn to use menus, toolbars, dialog boxes, and other controls in Windows applications, and how loops and branching structures function in...

Physics for Game Developers: Science, math, and code for realistic effects
Physics for Game Developers: Science, math, and code for realistic effects

If you want to enrich your game’s experience with physics-based realism, the expanded edition of this classic book details physics principles applicable to game development. You’ll learn about collisions, explosions, sound, projectiles, and other effects used in games on Wii, PlayStation, Xbox, smartphones, and tablets....

Encyclopedia of E-collaboration
Encyclopedia of E-collaboration

What is e-collaboration? Although this term means many things to many people, Ned Kock broadly defines it as “collaboration among individuals engaged in a common task using electronic technologies.” E-collaboration is not limited to computer-mediated communication (also known as CMC), or computer-supported cooperative work (known...

The Serving Leader: 5 Powerful Actions That Will Transform Your Team, Your Business, and Your Community (Ken Blanchard)
The Serving Leader: 5 Powerful Actions That Will Transform Your Team, Your Business, and Your Community (Ken Blanchard)

At a time of increasing concern about ethics at the top, The Serving Leader makes the case for an approach to leadership that is both more moral and more effective than the ruthless, anything-for-the-bottom-line approach that has brought disgrace—and often ruin—to many once-mighty organizations.

The Serving...

The Topology of Chaos: Alice in Stretch and Squeezeland
The Topology of Chaos: Alice in Stretch and Squeezeland

A new approach to understanding nonlinear dynamics and strange attractors

The behavior of a physical system may appear irregular or chaotic even when it is completely deterministic and predictable for short periods of time into the future. How does one model the dynamics of a system operating in a chaotic regime? Older tools such...

Mathematical Models of Beams and Cables
Mathematical Models of Beams and Cables

Nonlinear models of elastic and visco-elastic onedimensional continuous structures (beams and cables) are formulated by the authors of this title. Several models of increasing complexity are presented: straight/curved, planar/non-planar, extensible/inextensible, shearable/unshearable, warpingunsensitive/ sensitive, prestressed/unprestressed...

©2018 LearnIT (support@pdfchm.net) - Privacy Policy