Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Python Penetration Testing Essentials

Buy

Employ the power of Python to get the best out of pentesting

About This Book

  • Learn to detect and avoid various types of attacks that put the privacy of a system at risk
  • Employ practical approaches to penetration testing using Python to build efficient code and eventually save time
  • Enhance your concepts about wireless applications and information gathering of a web server

Who This Book Is For

If you are a Python programmer or a security researcher who has basic knowledge of Python programming and want to learn about penetration testing with the help of Python, this book is ideal for you. Even if you are new to the field of ethical hacking, this book can help you find the vulnerabilities in your system so that you are ready to tackle any kind of attack or intrusion.

What You Will Learn

  • Monitor the Ethernet IP and TCP traffic over the network
  • Explore wireless traffic with the help of various programs
  • Perform wireless attacks with Python programs
  • Check live systems and distinguish between the operating system and services of a remote machine
  • Broaden your concepts in pentesting right from the basics of the client/server architecture in Python
  • Gather passive information from a website using automated scripts
  • Perform XSS, SQL injection, and parameter tampering attacks

In Detail

This book is a practical guide that shows you the advantages of using Python for pentesting with the help of detailed code examples.

We start by exploring the basics of networking with Python and then proceed to network hacking. Next, we delve into hacking the application layer where we start with gathering information from a website. We then move on to concepts related to website hacking such as parameter tampering, DDoS, XSS, and SQL injection.

By reading this book, you will learn different techniques and methodologies that will familiarize you with the art of pentesting as well as creating automated programs to find the admin console, SQL injection, and XSS attack.

(HTML tags aren't allowed.)

Generation Xbox: How Videogames Invaded Hollywood
Generation Xbox: How Videogames Invaded Hollywood

Hollywood is under attack from videogames. Movies defined the 20th century but games are now pushing them aside as the medium that captures our time, fascination and money. Generation Xbox digs into the love-hate relationship between games and cinema that has led us to this point. It's a story of disaster, triumph and Angelia Jolie in hot...

Web Database Applications with PHP & MySQL
Web Database Applications with PHP & MySQL
Web database applications integrate databases and the Web. Well-known web destinations such as online auction sites, retail stores, news sites, discussion forums, and personalized home pages are all examples of web database applications. The popularity of these applications stems from their accessibility and usability: thousands of users...
Setting-Up a Small Observatory: From Concept to Construction (Patrick Moore's Practical Astronomy Series)
Setting-Up a Small Observatory: From Concept to Construction (Patrick Moore's Practical Astronomy Series)
This is the book to tell the intermediate-level amateur astronomer what he needs to know about observatories. It draws on the author’s practical experience and that of many other experienced amateur astronomers.

It is an ideal complement to Patrick Moore’s More Small Astronomical Observatories which is a compendium of ideas for...


LPIC-1: Linux Professional Institute Certification Study Guide: (Exams 101 and 102)
LPIC-1: Linux Professional Institute Certification Study Guide: (Exams 101 and 102)
Offering you thorough coverage of the new version of the leading Linux certification from Linux Professional Institute (LPI), this book covers both objectives and materials tested in the two required LPIC-1 exams: LPI 101 and LPI 102. You’ll certainly appreciate the clear, concise information on key exam topics, including using Linux command...
Metrics and Methods for Security Risk Management
Metrics and Methods for Security Risk Management

Metrics and Methods for Security Risk Management offers powerful analytic tools that have been absent from traditional security texts. This easy-to-read text provides a handy compendium of scientific principles that affect security threats, and establishes quantitative security metrics that facilitate the development of...

Arduino Development Cookbook
Arduino Development Cookbook

Over 50 hands-on recipes to quickly build and understand Arduino projects, from the simplest to the most extraordinary

About This Book

  • Get quick, clear guidance on all the principle aspects of integration with the Arduino
  • Learn the tools and components needed to build engaging electronics...
©2018 LearnIT (support@pdfchm.net) - Privacy Policy