Cargando…

Python penetration testing essentials : employ the power of Python to get the best out of pentesting /

If you are a Python programmer or a security researcher who has basic knowledge of Python programming and want to learn about penetration testing with the help of Python, this book is ideal for you. Even if you are new to the field of ethical hacking, this book can help you find the vulnerabilities...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Mohit (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham, England ; Mumbai [India] : Packt Publishing, 2015.
Colección:Community experience distilled
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 EBSCO_ocn903957504
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cn|||||||||
008 150303t20152015enka o 001 0 eng d
040 |a E7B  |b eng  |e rda  |e pn  |c E7B  |d COO  |d N$T  |d OCLCF  |d OCLCQ  |d OCLCO  |d N$T  |d OCLCQ  |d OCL  |d CNNOR  |d VT2  |d D6H  |d OCLCQ  |d NLE  |d STF  |d UKMGB  |d OCLCQ  |d WYU  |d G3B  |d UKAHL  |d RDF  |d NLW  |d OCL  |d OCLCO  |d OCLCQ  |d QGK 
016 7 |a 018007248  |2 Uk 
019 |a 961679406  |a 1259153887 
020 |a 9781784395889  |q (electronic bk.) 
020 |a 1784395889  |q (electronic bk.) 
020 |z 9781784397203 
020 |z 9781784398583 
020 |z 1784398586 
029 1 |a AU@  |b 000056942085 
029 1 |a CHNEW  |b 000705848 
029 1 |a CHNEW  |b 000712079 
029 1 |a UKMGB  |b 018007248 
035 |a (OCoLC)903957504  |z (OCoLC)961679406  |z (OCoLC)1259153887 
037 |a 9781784395889  |b Packt Publishing Pvt. Ltd 
050 4 |a QA76.73.P98  |b M645 2015eb 
072 7 |a COM  |x 051360  |2 bisacsh 
082 0 4 |a 005.133  |2 23 
049 |a UAMI 
100 0 |a Mohit,  |e author. 
245 1 0 |a Python penetration testing essentials :  |b employ the power of Python to get the best out of pentesting /  |c Mohit. 
264 1 |a Birmingham, England ;  |a Mumbai [India] :  |b Packt Publishing,  |c 2015. 
264 4 |c ©2015 
300 |a 1 online resource (178 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 0 |a Community experience distilled 
500 |a "Community experience distilled"--Cover 
500 |a Includes index. 
588 0 |a Online resource; title from PDF title page (ebrary, viewed February 28, 2015). 
505 0 |a Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Python with Penetration Testing and Networking; Introducing the scope of pentesting; The need for pentesting; Components to be tested; Qualities of a good pentester; Defining the scope of pentesting; Approaches to pentesting; Introducing Python scripting; Understanding the tests and tools you'll need; Learning the common testing platforms with Python; Network sockets; Server socket methods; Client socket methods; General socket methods; Moving on to the practical 
505 8 |a Socket exceptionsUseful socket methods; Summary; Chapter 2: Scanning Pentesting; How to check live systems in a network and the concept of a live system; Ping sweep; The TCP scan concept and its implementation using a Python script; How to create an efficient IP scanner; What are the services running on the target machine?; The concept of a port scanner; How to create an efficient port scanner; Summary; Chapter 3: Sniffing and Penetration Testing; Introducing a network sniffer; Passive sniffing; Active sniffing; Implementing a network sniffer using Python; Format characters 
505 8 |a Learning about packet craftingIntroducing ARP spoofing and implementing it using Python; The ARP request ; The ARP reply; The ARP cache; Testing the security system using custom packet crafting and injection; Network disassociation; A half-open scan; The FIN scan; ACK flag scanning; Ping of death; Summary; Chapter 4: Wireless Pentesting; Wireless SSID finding and wireless traffic analysis by Python; Detecting clients of an AP; Wireless attacks; The deauthentication (deauth) attacks; The MAC flooding attack; How the switch uses the CAM tables; The MAC flood logic; Summary 
505 8 |a Chapter 5: Foot Printing of a Web Server and a Web ApplicationThe concept of foot printing of a web server; Introducing information gathering ; Checking the HTTP header; Information gathering of a website from SmartWhois by the parser BeautifulSoup; Banner grabbing of a website; Hardening of a web server; Summary; Chapter 6: Client-side and DDoS Attacks; Introducing client-side validation; Tampering with the client-side parameter with Python; Effects of parameter tampering on business; Introducing DoS and DDoS; Single IP single port; Single IP multiple port; Multiple IP multiple port 
505 8 |a Detection of DDoSSummary; Chapter 7: Pentesting of SQLI and XSS; Introducing the SQL injection attack; Types of SQL injections; Simple SQL injection; Blind SQL injection; Understanding the SQL injection attack by a Python script; Learning about Cross-Site scripting; Persistent or stored XSS; Nonpersistent or reflected XSS; Summary; Index 
520 |a If you are a Python programmer or a security researcher who has basic knowledge of Python programming and want to learn about penetration testing with the help of Python, this book is ideal for you. Even if you are new to the field of ethical hacking, this book can help you find the vulnerabilities in your system so that you are ready to tackle any kind of attack or intrusion. 
546 |a English. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Python (Computer program language) 
650 0 |a Penetration testing (Computer security) 
650 6 |a Python (Langage de programmation) 
650 6 |a Tests d'intrusion. 
650 7 |a COMPUTERS  |x Programming Languages  |x Python.  |2 bisacsh 
650 7 |a Penetration testing (Computer security)  |2 fast  |0 (OCoLC)fst01789566 
650 7 |a Python (Computer program language)  |2 fast  |0 (OCoLC)fst01084736 
655 7 |a Juvenile works.  |2 fast  |0 (OCoLC)fst01411637 
776 0 8 |i Print version:  |a Mohit.  |t Python penetration testing essentials : employ the power of Python to get the best out of pentesting.  |d Birmingham, England ; Mumbai, [India] : Packt Publishing, ©2015  |h iii, 162 pages  |z 9781784397203 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=944480  |z Texto completo 
936 |a BATCHLOAD 
938 |a Askews and Holts Library Services  |b ASKH  |n AH28177812 
938 |a ebrary  |b EBRY  |n ebr11015681 
938 |a EBSCOhost  |b EBSC  |n 944480 
994 |a 92  |b IZTAP