Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learning Penetration Testing with Python

Buy

Utilize Python scripting to execute effective and efficient penetration tests

About This Book

  • Understand how and where Python scripts meet the need for penetration testing
  • Familiarise yourself with the process of highlighting a specific methodology to exploit an environment to fetch critical data
  • Develop your Python and penetration testing skills with real-world examples

Who This Book Is For

If you are a security professional or researcher, with knowledge of different operating systems and a conceptual idea of penetration testing, and you would like to grow your knowledge in Python, then this book is ideal for you.

What You Will Learn

  • Familiarise yourself with the generation of Metasploit resource files
  • Use the Metasploit Remote Procedure Call (MSFRPC) to automate exploit generation and execution
  • Use Python's Scrapy, network, socket, office, Nmap libraries, and custom modules
  • Parse Microsoft Office spreadsheets and eXtensible Markup Language (XML) data files
  • Write buffer overflows and reverse Metasploit modules to expand capabilities
  • Exploit Remote File Inclusion (RFI) to gain administrative access to systems with Python and other scripting languages
  • Crack an organization's Internet perimeter
  • Chain exploits to gain deeper access to an organization's resources
  • Interact with web services with Python

In Detail

Python is a powerful new-age scripting platform that allows you to build exploits, evaluate services, automate, and link solutions with ease. Python is a multi-paradigm programming language well suited to both object-oriented application development as well as functional design patterns. Because of the power and flexibility offered by it, Python has become one of the most popular languages used for penetration testing.

This book highlights how you can evaluate an organization methodically and realistically. Specific tradecraft and techniques are covered that show you exactly when and where industry tools can and should be used and when Python fits a need that proprietary and open source solutions do not.

Initial methodology, and Python fundamentals are established and then built on. Specific examples are created with vulnerable system images, which are available to the community to test scripts, techniques, and exploits. This book walks you through real-world penetration testing challenges and how Python can help.

From start to finish, the book takes you through how to create Python scripts that meet relative needs that can be adapted to particular situations. As chapters progress, the script examples explain new concepts to enhance your foundational knowledge, culminating with you being able to build multi-threaded security tools, link security tools together, automate reports, create custom exploits, and expand Metasploit modules.

Style and approach

This book is a practical guide that will help you become better penetration testers and/or Python security tool developers. Each chapter builds on concepts and tradecraft using detailed examples in test environments that you can simulate.

(HTML tags aren't allowed.)

Cubism (Art of Century)
Cubism (Art of Century)

Les Demoiselles d’Avignon: five young women that changed modern art forever. Faces seen simultaneously from the front and in profile, angular bodies whose once voluptuous feminine forms disappear behind asymmetric lines-with this painting, Picasso revolutionised the entire history of painting. Cubism was thus born in 1907....

CompTIA CySA+ Study Guide: Exam CS0-001
CompTIA CySA+ Study Guide: Exam CS0-001

Prepare yourself for the newest CompTIA certification

The CompTIA Cybersecurity Analyst+ (CySA+) Study Guide provides 100% coverage of all exam objectives for the new CySA+ certification. The CySA+ certification validates a candidate's skills to configure and use threat detection tools, perform data analysis,...

Data Integration Life Cycle Management with SSIS: A Short Introduction by Example
Data Integration Life Cycle Management with SSIS: A Short Introduction by Example
Build a custom BimlExpress framework that generates dozens of SQL Server Integration Services (SSIS) packages in minutes. Use this framework to execute related SSIS packages in a single command. You will learn to configure SSIS catalog projects, manage catalog deployments, and monitor SSIS catalog execution and history.

...

Outsider Art: From the Margins to the Marketplace
Outsider Art: From the Margins to the Marketplace

The term outsider art has been used to describe work produced exterior to the mainstream of modern art by certain self-taught visionaries, spiritualists, eccentrics, recluses, psychiatric patients, criminals, and others beyond the perceived margins of society. Yet the idea of such a raw, untaught creativity remains a...

Fearless Drawing: Illustrated Adventures for Overcoming Artistic Adversity
Fearless Drawing: Illustrated Adventures for Overcoming Artistic Adversity

Fearless Drawing is a fun and beautiful exercise and adventure book exploring how to rediscover the joy of drawing. There is a terrific fear attached to drawing, a frozen panic, a cry of "I can't draw!" Yet, embarking on these exciting drawing adventures will re-ignite the profound joy and artistic passion of drawing....

Best Practices for Graphic Designers, Color Works: Right Ways of Applying Color in Branding, Wayfinding, Information Design, Digital Environments and Pretty Much Everywhere Else
Best Practices for Graphic Designers, Color Works: Right Ways of Applying Color in Branding, Wayfinding, Information Design, Digital Environments and Pretty Much Everywhere Else

This is the go-to guide for designers as it outlines and details the essential color design skills needed to create successful, meaningful, and aesthetically compelling designs. Along with hands-on projects, it offers unique insights into strategy and business when working in the real world with real clients. Color...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy