|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
EBSCO_ocn903957504 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
150303t20152015enka o 001 0 eng d |
040 |
|
|
|a E7B
|b eng
|e rda
|e pn
|c E7B
|d COO
|d N$T
|d OCLCF
|d OCLCQ
|d OCLCO
|d N$T
|d OCLCQ
|d OCL
|d CNNOR
|d VT2
|d D6H
|d OCLCQ
|d NLE
|d STF
|d UKMGB
|d OCLCQ
|d WYU
|d G3B
|d UKAHL
|d RDF
|d NLW
|d OCL
|d OCLCO
|d OCLCQ
|d QGK
|
016 |
7 |
|
|a 018007248
|2 Uk
|
019 |
|
|
|a 961679406
|a 1259153887
|
020 |
|
|
|a 9781784395889
|q (electronic bk.)
|
020 |
|
|
|a 1784395889
|q (electronic bk.)
|
020 |
|
|
|z 9781784397203
|
020 |
|
|
|z 9781784398583
|
020 |
|
|
|z 1784398586
|
029 |
1 |
|
|a AU@
|b 000056942085
|
029 |
1 |
|
|a CHNEW
|b 000705848
|
029 |
1 |
|
|a CHNEW
|b 000712079
|
029 |
1 |
|
|a UKMGB
|b 018007248
|
035 |
|
|
|a (OCoLC)903957504
|z (OCoLC)961679406
|z (OCoLC)1259153887
|
037 |
|
|
|a 9781784395889
|b Packt Publishing Pvt. Ltd
|
050 |
|
4 |
|a QA76.73.P98
|b M645 2015eb
|
072 |
|
7 |
|a COM
|x 051360
|2 bisacsh
|
082 |
0 |
4 |
|a 005.133
|2 23
|
049 |
|
|
|a UAMI
|
100 |
0 |
|
|a Mohit,
|e author.
|
245 |
1 |
0 |
|a Python penetration testing essentials :
|b employ the power of Python to get the best out of pentesting /
|c Mohit.
|
264 |
|
1 |
|a Birmingham, England ;
|a Mumbai [India] :
|b Packt Publishing,
|c 2015.
|
264 |
|
4 |
|c ©2015
|
300 |
|
|
|a 1 online resource (178 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
0 |
|
|a Community experience distilled
|
500 |
|
|
|a "Community experience distilled"--Cover
|
500 |
|
|
|a Includes index.
|
588 |
0 |
|
|a Online resource; title from PDF title page (ebrary, viewed February 28, 2015).
|
505 |
0 |
|
|a Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Python with Penetration Testing and Networking; Introducing the scope of pentesting; The need for pentesting; Components to be tested; Qualities of a good pentester; Defining the scope of pentesting; Approaches to pentesting; Introducing Python scripting; Understanding the tests and tools you'll need; Learning the common testing platforms with Python; Network sockets; Server socket methods; Client socket methods; General socket methods; Moving on to the practical
|
505 |
8 |
|
|a Socket exceptionsUseful socket methods; Summary; Chapter 2: Scanning Pentesting; How to check live systems in a network and the concept of a live system; Ping sweep; The TCP scan concept and its implementation using a Python script; How to create an efficient IP scanner; What are the services running on the target machine?; The concept of a port scanner; How to create an efficient port scanner; Summary; Chapter 3: Sniffing and Penetration Testing; Introducing a network sniffer; Passive sniffing; Active sniffing; Implementing a network sniffer using Python; Format characters
|
505 |
8 |
|
|a Learning about packet craftingIntroducing ARP spoofing and implementing it using Python; The ARP request ; The ARP reply; The ARP cache; Testing the security system using custom packet crafting and injection; Network disassociation; A half-open scan; The FIN scan; ACK flag scanning; Ping of death; Summary; Chapter 4: Wireless Pentesting; Wireless SSID finding and wireless traffic analysis by Python; Detecting clients of an AP; Wireless attacks; The deauthentication (deauth) attacks; The MAC flooding attack; How the switch uses the CAM tables; The MAC flood logic; Summary
|
505 |
8 |
|
|a Chapter 5: Foot Printing of a Web Server and a Web ApplicationThe concept of foot printing of a web server; Introducing information gathering ; Checking the HTTP header; Information gathering of a website from SmartWhois by the parser BeautifulSoup; Banner grabbing of a website; Hardening of a web server; Summary; Chapter 6: Client-side and DDoS Attacks; Introducing client-side validation; Tampering with the client-side parameter with Python; Effects of parameter tampering on business; Introducing DoS and DDoS; Single IP single port; Single IP multiple port; Multiple IP multiple port
|
505 |
8 |
|
|a Detection of DDoSSummary; Chapter 7: Pentesting of SQLI and XSS; Introducing the SQL injection attack; Types of SQL injections; Simple SQL injection; Blind SQL injection; Understanding the SQL injection attack by a Python script; Learning about Cross-Site scripting; Persistent or stored XSS; Nonpersistent or reflected XSS; Summary; Index
|
520 |
|
|
|a If you are a Python programmer or a security researcher who has basic knowledge of Python programming and want to learn about penetration testing with the help of Python, this book is ideal for you. Even if you are new to the field of ethical hacking, this book can help you find the vulnerabilities in your system so that you are ready to tackle any kind of attack or intrusion.
|
546 |
|
|
|a English.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Python (Computer program language)
|
650 |
|
0 |
|a Penetration testing (Computer security)
|
650 |
|
6 |
|a Python (Langage de programmation)
|
650 |
|
6 |
|a Tests d'intrusion.
|
650 |
|
7 |
|a COMPUTERS
|x Programming Languages
|x Python.
|2 bisacsh
|
650 |
|
7 |
|a Penetration testing (Computer security)
|2 fast
|0 (OCoLC)fst01789566
|
650 |
|
7 |
|a Python (Computer program language)
|2 fast
|0 (OCoLC)fst01084736
|
655 |
|
7 |
|a Juvenile works.
|2 fast
|0 (OCoLC)fst01411637
|
776 |
0 |
8 |
|i Print version:
|a Mohit.
|t Python penetration testing essentials : employ the power of Python to get the best out of pentesting.
|d Birmingham, England ; Mumbai, [India] : Packt Publishing, ©2015
|h iii, 162 pages
|z 9781784397203
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=944480
|z Texto completo
|
936 |
|
|
|a BATCHLOAD
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH28177812
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr11015681
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 944480
|
994 |
|
|
|a 92
|b IZTAP
|