Cargando…

Python Penetration Testing Essentials : Techniques for ethical hacking with Python, 2nd Edition.

This book gives you the skills you need to use Python for penetration testing, with the help of detailed code examples. This book has been updated for Python 3.6.3 and Kali Linux 2018.1.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Raj, Mohit
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Publishing, 2018.
Edición:2nd ed.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mi 4500
001 EBOOKCENTRAL_on1039696623
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cnu---unuuu
008 180609s2018 enk o 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d MERUC  |d IDB  |d CHVBK  |d NLE  |d TEFOD  |d OCLCQ  |d LVT  |d C6I  |d OCLCQ  |d UX1  |d K6U  |d OCLCQ 
019 |a 1175643704 
020 |a 9781789136043  |q (electronic bk.) 
020 |a 1789136040  |q (electronic bk.) 
020 |z 9781789138962 
020 |a 1789138965  |q (Trade Paper) 
020 |a 9781789138962 
024 3 |a 9781789138962 
029 1 |a CHNEW  |b 001016552 
029 1 |a CHVBK  |b 523135491 
029 1 |a AU@  |b 000067288788 
035 |a (OCoLC)1039696623  |z (OCoLC)1175643704 
037 |a 892DA41E-1753-4E10-8B62-D32515B49618  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a QA76.73.P98  |b .M645 2018eb 
082 0 4 |a 005.133  |2 23 
049 |a UAMI 
100 1 |a Raj, Mohit. 
245 1 0 |a Python Penetration Testing Essentials :  |b Techniques for ethical hacking with Python, 2nd Edition. 
250 |a 2nd ed. 
260 |a Birmingham :  |b Packt Publishing,  |c 2018. 
300 |a 1 online resource (220 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
505 0 |a Cover; Title Page; Copyright and Credits; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Python with Penetration Testing and Networking; Introducing the scope of pentesting; The need for pentesting; Components to be tested; Qualities of a good pentester; Defining the scope of pentesting; Approaches to pentesting; Introducing Python scripting; Understanding the tests and tools you'll need; Learning the common testing platforms with Python; Network sockets; Server socket methods; Client socket methods; General socket methods; Moving on to the practical; Socket exceptions. 
505 8 |a Useful socket methodsSummary; Chapter 2: Scanning Pentesting; How to check live systems in a network and the concept of a live system; Ping sweep; The TCP scan concept and its implementation using a Python script; How to create an efficient IP scanner in Windows; How to create an efficient IP scanner in Linux; The concept of the Linux-based IP scanner; nmap with Python; What are the services running on the target machine?; The concept of a port scanner; How to create an efficient port scanner; Summary; Chapter 3: Sniffing and Penetration Testing; Introducing a network sniffer. 
505 8 |a Passive sniffingActive sniffing; Implementing a network sniffer using Python; Format characters; Learning about packet crafting; Introducing ARP spoofing and implementing it using Python; The ARP request; The ARP reply; The ARP cache; Testing the security system using custom packet crafting ; A half-open scan; The FIN scan; ACK flag scanning; Summary; Chapter 4: Network Attacks and Prevention; Technical requirements; DHCP starvation attack; The MAC flooding attack; How the switch uses the CAM tables; The MAC flood logic; Gateway disassociation by RAW socket; Torrent detection. 
505 8 |a Running the program in hidden modeSummary; Chapter 5: Wireless Pentesting; Introduction to 802.11 frames; Wireless SSID finding and wireless traffic analysis with Python; Detecting clients of an AP; Wireless hidden SSID scanner; Wireless attacks; The deauthentication (deauth) attack; Detecting the deauth attack; Summary; Chapter 6: Honeypot -- Building Traps for Attackers; Technical requirements; Fake ARP reply; Fake ping reply; Fake port-scanning reply; Fake OS-signature reply to nmap; Fake web server reply; Summary ; Chapter 7: Foot Printing a Web Server and a Web Application. 
505 8 |a The concept of foot printing a web serverIntroducing information gathering; Checking the HTTP header; Information gathering of a website from whois.domaintools.com ; Email address gathering from a web page; Banner grabbing of a website; Hardening of a web server; Summary; Chapter 8: Client-Side and DDoS Attacks; Introducing client-side validation; Tampering with the client-side parameter with Python; Effects of parameter tampering on business; Introducing DoS and DDoS; Single IP, single ports; Single IP, multiple port; Multiple IP, multiple ports; Detection of DDoS; Summary. 
500 |a Chapter 9: Pentesting SQL and XSS. 
520 |a This book gives you the skills you need to use Python for penetration testing, with the help of detailed code examples. This book has been updated for Python 3.6.3 and Kali Linux 2018.1. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Python. 
650 0 |a Penetration testing. 
650 7 |a Computer security.  |2 bicssc 
650 7 |a Network security.  |2 bicssc 
650 7 |a Programming & scripting languages: general.  |2 bicssc 
650 7 |a Computers  |x Networking  |x Security.  |2 bisacsh 
650 7 |a Computers  |x Security  |x General.  |2 bisacsh 
650 7 |a Computers  |x Programming Languages  |x Python.  |2 bisacsh 
776 0 8 |i Print version:  |a Raj, Mohit.  |t Python Penetration Testing Essentials : Techniques for ethical hacking with Python, 2nd Edition.  |d Birmingham : Packt Publishing, ©2018 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=5405700  |z Texto completo 
938 |a EBL - Ebook Library  |b EBLB  |n EBL5405700 
994 |a 92  |b IZTAP