Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learning Penetration Testing with Python

Buy

Utilize Python scripting to execute effective and efficient penetration tests

About This Book

  • Understand how and where Python scripts meet the need for penetration testing
  • Familiarise yourself with the process of highlighting a specific methodology to exploit an environment to fetch critical data
  • Develop your Python and penetration testing skills with real-world examples

Who This Book Is For

If you are a security professional or researcher, with knowledge of different operating systems and a conceptual idea of penetration testing, and you would like to grow your knowledge in Python, then this book is ideal for you.

What You Will Learn

  • Familiarise yourself with the generation of Metasploit resource files
  • Use the Metasploit Remote Procedure Call (MSFRPC) to automate exploit generation and execution
  • Use Python's Scrapy, network, socket, office, Nmap libraries, and custom modules
  • Parse Microsoft Office spreadsheets and eXtensible Markup Language (XML) data files
  • Write buffer overflows and reverse Metasploit modules to expand capabilities
  • Exploit Remote File Inclusion (RFI) to gain administrative access to systems with Python and other scripting languages
  • Crack an organization's Internet perimeter
  • Chain exploits to gain deeper access to an organization's resources
  • Interact with web services with Python

In Detail

Python is a powerful new-age scripting platform that allows you to build exploits, evaluate services, automate, and link solutions with ease. Python is a multi-paradigm programming language well suited to both object-oriented application development as well as functional design patterns. Because of the power and flexibility offered by it, Python has become one of the most popular languages used for penetration testing.

This book highlights how you can evaluate an organization methodically and realistically. Specific tradecraft and techniques are covered that show you exactly when and where industry tools can and should be used and when Python fits a need that proprietary and open source solutions do not.

Initial methodology, and Python fundamentals are established and then built on. Specific examples are created with vulnerable system images, which are available to the community to test scripts, techniques, and exploits. This book walks you through real-world penetration testing challenges and how Python can help.

From start to finish, the book takes you through how to create Python scripts that meet relative needs that can be adapted to particular situations. As chapters progress, the script examples explain new concepts to enhance your foundational knowledge, culminating with you being able to build multi-threaded security tools, link security tools together, automate reports, create custom exploits, and expand Metasploit modules.

Style and approach

This book is a practical guide that will help you become better penetration testers and/or Python security tool developers. Each chapter builds on concepts and tradecraft using detailed examples in test environments that you can simulate.

(HTML tags aren't allowed.)

Windows 10 Revealed: The Universal Windows Operating System for PC, Tablets, and Windows Phone
Windows 10 Revealed: The Universal Windows Operating System for PC, Tablets, and Windows Phone

Windows 10 Revealed is your essential step-by-step guide to using a desktop, laptop, Surface or Windows Phone running Microsoft Windows 10, providing a complete resource for both the beginner and the enthusiast. Techniques are illustrated step-by-step using photography and screen shots throughout, together with concise, easy to...

Scripting Your World: The Official Guide to Second Life Scripting
Scripting Your World: The Official Guide to Second Life Scripting
Find complete information about Second Life scripting and gain access to more than 50 previously unpublished ready-to-use scripts in Scripting Your World: The Official Guide to Second Life Scripting.  Learn how to script Second Life behaviors, grouped into categories like avatar movement, communications, prim and object control,...
The Moderator's Survival Guide: Handling Common, Tricky, and Sticky Situations in User Research
The Moderator's Survival Guide: Handling Common, Tricky, and Sticky Situations in User Research

The Moderator's Survival Guide is your indispensable resource for navigating the rocky shoals of your one-on-one user research sessions. Inside, you’ll find guidance for nearly 100 diverse situations (ranging from business-as-usual to tricky and sticky) that might occur during usability studies, contextual inquiries, or user...


Wireless Quality of Service: Techniques, Standards, and Applications (Wireless Networks and Mobile Communications)
Wireless Quality of Service: Techniques, Standards, and Applications (Wireless Networks and Mobile Communications)
Focusing on an important and complicated topic in wireless network design, Wireless Quality of Service: Techniques, Standards, and Applications systematically addresses the quality-of-service (QoS) issues found in many types of popular wireless networks.

In each chapter, the book presents numerous QoS challenges encountered in...

Designing Forms for Microsoft Office InfoPath and Forms Services 2007 (Microsoft .NET Development Series)
Designing Forms for Microsoft Office InfoPath and Forms Services 2007 (Microsoft .NET Development Series)
"Microsoft Office InfoPath represents a revolutionary leap in XML technologies and a new paradigm for gathering business-critical information. I am delighted that Scott Roberts and Hagen Green, two distinguished members of the InfoPath product team, decided to share their experience in this book."

--From the Foreword by Jean...

Outlook 2007: Beyond the Manual
Outlook 2007: Beyond the Manual
Many people use Outlook either by choice or by force, but few of them do more than scratch the surface of the personal information manager's many features. And after years of spending hours each day within Outlook, most users become at least proficient with its base features.

Outlook 2007: Beyond the Manual takes you to the next level,...

©2018 LearnIT (support@pdfchm.net) - Privacy Policy