Cargando…

Effective Python penetration testing : pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools /

Pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and toolsAbout This Book Learn to utilize your Python scripting skills to pentest a computer system, network, and web-application Get proficient at the art of assessing vulnerabilities by conducting...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Rehim, Rejah (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Publishing, 2016.
Colección:Community experience distilled.
Temas:
Acceso en línea:Texto completo
Texto completo

MARC

LEADER 00000cam a2200000Ii 4500
001 EBSCO_ocn953694635
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 160718s2016 enka o 000 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d OCLCF  |d DEBBG  |d N$T  |d IDEBK  |d YDXCP  |d DEBSZ  |d FEM  |d NLE  |d COO  |d VT2  |d OCLCQ  |d OCL  |d OCLCQ  |d CEF  |d OCLCQ  |d AGLDB  |d IGB  |d STF  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 953053924  |a 953234258  |a 958945808  |a 968116325  |a 969016699  |a 1259210588 
020 |a 9781785280962  |q (electronic bk.) 
020 |a 1785280961  |q (electronic bk.) 
020 |z 9781785280696 
020 |z 1785280694 
029 1 |a DEBBG  |b BV043969786 
029 1 |a DEBSZ  |b 480370877 
029 1 |a DEBSZ  |b 485803143 
029 1 |a GBVCP  |b 882757849 
029 1 |a AU@  |b 000067105945 
035 |a (OCoLC)953694635  |z (OCoLC)953053924  |z (OCoLC)953234258  |z (OCoLC)958945808  |z (OCoLC)968116325  |z (OCoLC)969016699  |z (OCoLC)1259210588 
037 |a CL0500000763  |b Safari Books Online 
050 4 |a QA76.9.A25 
072 7 |a COM  |x 043050  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Rehim, Rejah,  |e author. 
245 1 0 |a Effective Python penetration testing :  |b pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools /  |c Rejah Rehim. 
264 1 |a Birmingham :  |b Packt Publishing,  |c 2016. 
300 |a 1 online resource :  |b illustrations. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |2 rda 
490 1 |a Community experience distilled 
588 0 |a Online resource; title from PDF title page (EBSCO, viewed March 1, 2017). 
520 |a Pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and toolsAbout This Book Learn to utilize your Python scripting skills to pentest a computer system, network, and web-application Get proficient at the art of assessing vulnerabilities by conducting effective penetration testing This is the ultimate guide that teaches you how to use Python to protect your systems against sophisticated cyber attacksWho This Book Is For This book is ideal for those who are comfortable with Python or a similar language and need no help with basic programming concepts, but want to understand the basics of penetration testing and the problems pentesters face. What You Will Learn Write Scapy scripts to investigate network traffic Get to know application fingerprinting techniques with Python Understand the attack scripting techniques Write fuzzing tools with pentesting requirements Learn basic attack scripting methods Utilize cryptographic toolkits in Python Automate pentesting with Python tools and librariesIn Detail Penetration testing is a practice of testing a computer system, network, or web application to find weaknesses in security that an attacker can exploit. Effective Python Penetration Testing will help you utilize your Python scripting skills to safeguard your networks from cyberattacks. We will begin by providing you with an overview of Python scripting and penetration testing. You will learn to analyze network traffic by writing Scapy scripts and will see how to fingerprint web applications with Python libraries such as ProxMon and Spynner. Moving on, you will find out how to write basic attack scripts, and will develop debugging and reverse engineering skills with Python libraries. Toward the end of the book, you will discover how to utilize cryptography toolkits in Python and how to automate Python tools and libraries. Style and approach This is an expert's guide to Python with a practical based approach, where each chapter will help you improve your penetration testing skills using Python to become a master pen tester. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Penetration testing (Computer security) 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Python (Computer program language) 
650 6 |a Tests d'intrusion. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Python (Langage de programmation) 
650 7 |a COMPUTERS  |x Security  |x Networking.  |2 bisacsh 
650 7 |a Penetration testing (Computer security)  |2 fast 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Python (Computer program language)  |2 fast 
776 0 8 |i Print version:  |a Rehim, Rejah.  |t Effective Python Penetration Testing.  |b 1.  |d Packt Publishing, 2016  |z 1785280694  |z 9781785280696  |w (OCoLC)949750877 
830 0 |a Community experience distilled. 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1261876  |z Texto completo 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781785280696/?ar  |z Texto completo 
938 |a EBSCOhost  |b EBSC  |n 1261876 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis34551270 
938 |a YBP Library Services  |b YANK  |n 13057679 
994 |a 92  |b IZTAP