Cargando…

Python : penetration testing for developers : unleash the power of Python scripting to execute effective and efficient penetration tests : a course in three modules /

Unleash the power of Python scripting to execute effective and efficient penetration tests About This Book Sharpen your pentesting skills with Python Develop your fluency with Python to write sharper scripts for rigorous security testing Get stuck into some of the most powerful tools in the security...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Duffy, Christopher (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham, UK : Packt Publishing, 2016.
Colección:Learning path.
Temas:
Acceso en línea:Texto completo
Texto completo

MARC

LEADER 00000cam a2200000Ii 4500
001 EBSCO_ocn962192181
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 161107s2016 enka ob 001 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d OCLCF  |d STF  |d DEBBG  |d IDEBK  |d TEFOD  |d DEBSZ  |d OCLCQ  |d COO  |d VT2  |d UOK  |d CEF  |d KSU  |d NLE  |d OCLCO  |d UKMGB  |d WYU  |d N$T  |d AGLDB  |d IGB  |d AUW  |d BTN  |d INTCL  |d MHW  |d SNK  |d UKAHL  |d QGK  |d OCLCO  |d OCLCQ 
015 |a GBB758375  |2 bnb 
016 7 |a 018105391  |2 Uk 
020 |a 9781787120976  |q (electronic bk.) 
020 |a 178712097X  |q (electronic bk.) 
020 |z 9781787128187 
020 |z 1787128180 
029 1 |a DEBBG  |b BV043970675 
029 1 |a DEBSZ  |b 485811499 
029 1 |a GBVCP  |b 882851241 
029 1 |a UKMGB  |b 018105391 
035 |a (OCoLC)962192181 
037 |a CL0500000799  |b Safari Books Online 
037 |a 9A36018C-2DE1-4A5C-9AE5-18FA8407C60D  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a QA76.9.A25 
072 7 |a COM  |x 053000  |2 bisacsh 
072 7 |a COM  |x 051360  |2 bisacsh 
072 7 |a COM  |x 051230  |2 bisacsh 
082 0 4 |a 005.8092  |2 23 
049 |a UAMI 
100 1 |a Duffy, Christopher,  |e author. 
245 1 0 |a Python :  |b penetration testing for developers : unleash the power of Python scripting to execute effective and efficient penetration tests : a course in three modules /  |c Christopher Duffy. 
246 3 0 |a Unleash the power of Python scripting to execute effective and efficient penetration tests 
264 1 |a Birmingham, UK :  |b Packt Publishing,  |c 2016. 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Learning path 
588 |a Description based on online resource; title from title page (Safari, viewed November 3, 2016). 
500 |a Authors: Christopher Duffy [and six others]. Cf. Credits page. 
504 |a Includes bibliographical references and index. 
520 |a Unleash the power of Python scripting to execute effective and efficient penetration tests About This Book Sharpen your pentesting skills with Python Develop your fluency with Python to write sharper scripts for rigorous security testing Get stuck into some of the most powerful tools in the security world Who This Book Is For If you are a Python programmer or a security researcher who has basic knowledge of Python programming and wants to learn about penetration testing with the help of Python, this course is ideal for you. Even if you are new to the field of ethical hacking, this course can help you find the vulnerabilities in your system so that you are ready to tackle any kind of attack or intrusion. What You Will Learn Familiarize yourself with the generation of Metasploit resource files and use the Metasploit Remote Procedure Call to automate exploit generation and execution Exploit the Remote File Inclusion to gain administrative access to systems with Python and other scripting languages Crack an organization's Internet perimeter and chain exploits to gain deeper access to an organization's resources Explore wireless traffic with the help of various programs and perform wireless attacks with Python programs Gather passive information from a website using automated scripts and perform XSS, SQL injection, and parameter tampering attacks Develop complicated header-based attacks through Python In Detail Cybercriminals are always one step ahead, when it comes to tools and techniques. This means you need to use the same tools and adopt the same mindset to properly secure your software. This course shows you how to do just that, demonstrating how effective Python can be for powerful pentesting that keeps your software safe. Comprising of three key modules, follow each one to push your Python and security skills to the next level. In the first module, we'll show you how to get to grips with the fundamentals. This means you'll quickly find out how to tackle some of the common challenges facing pentesters using custom Python tools designed specifically for your needs. You'll also learn what tools to use and when, giving you complete confidence when deploying your pentester tools to combat any potential threat. In the next module you'll begin hacking into the application layer. Covering everything from parameter tampering, DDoS, XXS and SQL injection, it will build on the knowledge and skills you learned in the first module to make you an even mor... 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Penetration testing (Computer security) 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Python (Computer program language) 
650 6 |a Tests d'intrusion. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Python (Langage de programmation) 
650 7 |a COMPUTERS / Security / General.  |2 bisacsh 
650 7 |a COMPUTERS / Programming Languages / Python.  |2 bisacsh 
650 7 |a COMPUTERS / Software Development & Engineering / General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Penetration testing (Computer security)  |2 fast  |0 (OCoLC)fst01789566 
650 7 |a Python (Computer program language)  |2 fast  |0 (OCoLC)fst01084736 
830 0 |a Learning path. 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1402481  |z Texto completo 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781787128187/?ar  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH31954920 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis36853513 
938 |a EBSCOhost  |b EBSC  |n 1402481 
994 |a 92  |b IZTAP