Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learning Penetration Testing with Python

Buy

Utilize Python scripting to execute effective and efficient penetration tests

About This Book

  • Understand how and where Python scripts meet the need for penetration testing
  • Familiarise yourself with the process of highlighting a specific methodology to exploit an environment to fetch critical data
  • Develop your Python and penetration testing skills with real-world examples

Who This Book Is For

If you are a security professional or researcher, with knowledge of different operating systems and a conceptual idea of penetration testing, and you would like to grow your knowledge in Python, then this book is ideal for you.

What You Will Learn

  • Familiarise yourself with the generation of Metasploit resource files
  • Use the Metasploit Remote Procedure Call (MSFRPC) to automate exploit generation and execution
  • Use Python's Scrapy, network, socket, office, Nmap libraries, and custom modules
  • Parse Microsoft Office spreadsheets and eXtensible Markup Language (XML) data files
  • Write buffer overflows and reverse Metasploit modules to expand capabilities
  • Exploit Remote File Inclusion (RFI) to gain administrative access to systems with Python and other scripting languages
  • Crack an organization's Internet perimeter
  • Chain exploits to gain deeper access to an organization's resources
  • Interact with web services with Python

In Detail

Python is a powerful new-age scripting platform that allows you to build exploits, evaluate services, automate, and link solutions with ease. Python is a multi-paradigm programming language well suited to both object-oriented application development as well as functional design patterns. Because of the power and flexibility offered by it, Python has become one of the most popular languages used for penetration testing.

This book highlights how you can evaluate an organization methodically and realistically. Specific tradecraft and techniques are covered that show you exactly when and where industry tools can and should be used and when Python fits a need that proprietary and open source solutions do not.

Initial methodology, and Python fundamentals are established and then built on. Specific examples are created with vulnerable system images, which are available to the community to test scripts, techniques, and exploits. This book walks you through real-world penetration testing challenges and how Python can help.

From start to finish, the book takes you through how to create Python scripts that meet relative needs that can be adapted to particular situations. As chapters progress, the script examples explain new concepts to enhance your foundational knowledge, culminating with you being able to build multi-threaded security tools, link security tools together, automate reports, create custom exploits, and expand Metasploit modules.

Style and approach

This book is a practical guide that will help you become better penetration testers and/or Python security tool developers. Each chapter builds on concepts and tradecraft using detailed examples in test environments that you can simulate.

(HTML tags aren't allowed.)

Spring Recipes: A Problem-Solution Approach (Books for Professionals by Professionals)
Spring Recipes: A Problem-Solution Approach (Books for Professionals by Professionals)
Spring addresses most aspects of Java/Java EE application development and offers simple solutions to them. By using Spring, you will be lead to use industry best practices to design and implement your applications. The releases of Spring 2.x have added many improvements and new features to the 1.x versions. Spring Recipes: A...
RFID in Manufacturing
RFID in Manufacturing
Information systems for manufacturing often follow a three-layer architecture based on an enterprise resource planning (ERP) layer (for order planning), a manufacturing execution system (MES) layer (for factory control), and a shop floor layer (for machine control). Future requirements on flexibility and adaptability require a much closer...
Understanding Circuits: Learning Problem Solving Using Circuit Analysis (Synthesis Lectures on Electrical Engineering)
Understanding Circuits: Learning Problem Solving Using Circuit Analysis (Synthesis Lectures on Electrical Engineering)

This book/lecture is intended for a college freshman level class in problem solving, where the particular problems deal with electrical and electronic circuits. It can also be used in a junior/senior level class in high school to teach circuit analysis. The basic problem-solving paradigm used in this book is that of resolution of a problem...


Sage Beginner's Guide
Sage Beginner's Guide

Results matter, whether you are a mathematician, scientist, or engineer. The time that you spend doing tedious mathematical calculations could be spent in more productive ways. Sage is an open-source mathematical software system that helps you perform many mathematical tasks. There is no reason to compute integrals or perform algebraic...

Engineering Chemistry
Engineering Chemistry

Engineers and scientists are required to master chemical principles because many of the problems they encounter involve chemical processes or the composition and properties of materials. This book is designed to present the fundamental concepts of chemistry as they relate to modern engineering applications. As an up-to-date reference it can...

Computer Algebra in Scientific Computing: 15th International Workshop, CASC 2013, Berlin, Germany, September 9-13, 2013, Proceedings (Lecture Notes in Computer Science)
Computer Algebra in Scientific Computing: 15th International Workshop, CASC 2013, Berlin, Germany, September 9-13, 2013, Proceedings (Lecture Notes in Computer Science)

This book constitutes the proceedings of the 14th International Workshop on Computer Algebra in Scientific Computing, CASC 2013, held in Berlin, Germany, in September 2013. The 33 full papers presented were carefully reviewed and selected for inclusion in this book.

The papers address issues such as polynomial algebra; the solution...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy