Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Python Penetration Testing Essentials


Employ the power of Python to get the best out of pentesting

About This Book

  • Learn to detect and avoid various types of attacks that put the privacy of a system at risk
  • Employ practical approaches to penetration testing using Python to build efficient code and eventually save time
  • Enhance your concepts about wireless applications and information gathering of a web server

Who This Book Is For

If you are a Python programmer or a security researcher who has basic knowledge of Python programming and want to learn about penetration testing with the help of Python, this book is ideal for you. Even if you are new to the field of ethical hacking, this book can help you find the vulnerabilities in your system so that you are ready to tackle any kind of attack or intrusion.

What You Will Learn

  • Monitor the Ethernet IP and TCP traffic over the network
  • Explore wireless traffic with the help of various programs
  • Perform wireless attacks with Python programs
  • Check live systems and distinguish between the operating system and services of a remote machine
  • Broaden your concepts in pentesting right from the basics of the client/server architecture in Python
  • Gather passive information from a website using automated scripts
  • Perform XSS, SQL injection, and parameter tampering attacks

In Detail

This book is a practical guide that shows you the advantages of using Python for pentesting with the help of detailed code examples.

We start by exploring the basics of networking with Python and then proceed to network hacking. Next, we delve into hacking the application layer where we start with gathering information from a website. We then move on to concepts related to website hacking such as parameter tampering, DDoS, XSS, and SQL injection.

By reading this book, you will learn different techniques and methodologies that will familiarize you with the art of pentesting as well as creating automated programs to find the admin console, SQL injection, and XSS attack.

(HTML tags aren't allowed.)

Digital SLR Cameras and Photography For Dummies (Computer/Tech)
Digital SLR Cameras and Photography For Dummies (Computer/Tech)

The ideal guide for beginning DSLR camera users, with full-color examples of what you can achieve

Make the most of your Canon, Nikon, Sony, Pentax, or Olympus digital SLR camera! This guide explains the different lenses, the many settings and how to use them, the results you can get from using different controls, how to use lighting and...

Pomegranates: Ancient Roots to Modern Medicine (Medicinal and Aromatic Plants - Industrial Profiles)
Pomegranates: Ancient Roots to Modern Medicine (Medicinal and Aromatic Plants - Industrial Profiles)

While one may not find ancient studies that substantiate the pomegranate's curative and preventive qualities, the exalted status of this fruit goes back as far as the history of agriculture itself. Allusions to the pomegranate are readily found in the oldest cultures of the Indus Valley, ancient China, and classical Greece, as well as in...

Beginning Math and Physics for Game Programmers
Beginning Math and Physics for Game Programmers
Whether you're a hobbyist or a budding game design pro, your objective is probably the same: To create the coolest games possible using today's increasingly sophisticated technology. To do that, however, you need to understand some basic math and physics concepts. Not to worry: You don't need to go to night school if you get this handy guide!...

Enterprise Solution Patterns Using Microsoft .Net: Version 2.0 : Patterns & Practices
Enterprise Solution Patterns Using Microsoft .Net: Version 2.0 : Patterns & Practices

This book captures the knowledge of seasoned developers and presents it in the form of a patterns catalog. Each pattern contains a simple, proven mechanism that solves a commonly recurring technical challenge. Patterns provide a common vocabulary and taxonomy for developers and architects to describe solutions concisely. By providing a...

Solaris 10 System Administration Essentials
Solaris 10 System Administration Essentials

Solaris™ 10 System Administration Essentials is the first book to concisely yet comprehensively cover all of the breakthrough features of the Solaris 10 operating system. The Solaris OS has a long history of innovation, and the Solaris 10 OS is a watershed release that includes features such...

Killer Photos with Your iPhone
Killer Photos with Your iPhone

Killer Photos with Your iPhone shows students how to take fantastic pictures using the camera built right into their iPhone. Because of its portability and unique capabilities, the iPhone camera is now one of the most popular digital cameras on the market, and this book shows you how to do everything from taking simple pictures to using apps...

©2018 LearnIT (support@pdfchm.net) - Privacy Policy