Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Python Penetration Testing Essentials

Buy

Employ the power of Python to get the best out of pentesting

About This Book

  • Learn to detect and avoid various types of attacks that put the privacy of a system at risk
  • Employ practical approaches to penetration testing using Python to build efficient code and eventually save time
  • Enhance your concepts about wireless applications and information gathering of a web server

Who This Book Is For

If you are a Python programmer or a security researcher who has basic knowledge of Python programming and want to learn about penetration testing with the help of Python, this book is ideal for you. Even if you are new to the field of ethical hacking, this book can help you find the vulnerabilities in your system so that you are ready to tackle any kind of attack or intrusion.

What You Will Learn

  • Monitor the Ethernet IP and TCP traffic over the network
  • Explore wireless traffic with the help of various programs
  • Perform wireless attacks with Python programs
  • Check live systems and distinguish between the operating system and services of a remote machine
  • Broaden your concepts in pentesting right from the basics of the client/server architecture in Python
  • Gather passive information from a website using automated scripts
  • Perform XSS, SQL injection, and parameter tampering attacks

In Detail

This book is a practical guide that shows you the advantages of using Python for pentesting with the help of detailed code examples.

We start by exploring the basics of networking with Python and then proceed to network hacking. Next, we delve into hacking the application layer where we start with gathering information from a website. We then move on to concepts related to website hacking such as parameter tampering, DDoS, XSS, and SQL injection.

By reading this book, you will learn different techniques and methodologies that will familiarize you with the art of pentesting as well as creating automated programs to find the admin console, SQL injection, and XSS attack.

(HTML tags aren't allowed.)

ITIL Continual Service Improvement 2011 Edition (Best Management Practices)
ITIL Continual Service Improvement 2011 Edition (Best Management Practices)

The ITIL 2011 Editions have been updated for clarity, consistency, correctness and completeness. Alongside the delivery of consistent, repeatable process activities as part of service quality, ITIL has always emphasized the importance of continual service improvement. Focusing on the process elements involved in identifying and introducing...

Vehicle Crash Mechanics
Vehicle Crash Mechanics
Governed by strict regulations and the intricate balance of complex interactions among variables, the application of mechanics to vehicle crashworthiness is not a simple task. It demands a solid understanding of the fundamentals, careful analysis, and practical knowledge of the tools and techniques of that analysis. Vehicle Crash Mechanics sets...
Performance by Design: Computer Capacity Planning By Example
Performance by Design: Computer Capacity Planning By Example

Practical systems modeling: planning performance, availability, security, and more

Computing systems must meet increasingly strict Quality of Service (QoS) requirements for performance, availability, security, and maintainability. To achieve these goals, designers, analysts, and capacity planners need a far more thorough understanding of...


Java for ColdFusion Developers
Java for ColdFusion Developers

The first Java guide specifically for experienced ColdFusion developers and Web professionals!

  • Leverage your Web and ColdFusion skills to develop powerful Java applications
  • Master JSP, servlets, custom tags, JavaBeans, JDBC, and other key Java Web technologies
  • Install and run Apache Tomcat 4 and...
Beyond Sarbanes-Oxley Compliance: Effective Enterprise Risk Management
Beyond Sarbanes-Oxley Compliance: Effective Enterprise Risk Management
“…full of pragmatic advice on achieving and sustaining compliance” (Supply Management, 5th January 2005)

Designed to lead financial managers from initial compliance with the Sarbanes-Oxley Act, through ongoing maintenance and monitoring, Beyond Sarbanes-Oxley Compliance helps
...
Recent Advances in Intelligent Informatics: Proceedings of the Second International Symposium on Intelligent Informatics (ISI'13), August 23-24 2013, ... in Intelligent Systems and Computing)
Recent Advances in Intelligent Informatics: Proceedings of the Second International Symposium on Intelligent Informatics (ISI'13), August 23-24 2013, ... in Intelligent Systems and Computing)

This book constitutes the thoroughly refereed post-conference proceedings of the Second International Symposium on Intelligent Informatics (ISI 2013) held in Mysore, India during August 23-24, 2013. The 47 revised papers presented were carefully reviewed and selected from 126 initial submissions. The papers are organized in topical sections...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy