Cargando…

Python penetration testing essentials : techniques for ethical hacking with Python /

This book gives you the skills you need to use Python for penetration testing, with the help of detailed code examples. This book has been updated for Python 3.6.3 and Kali Linux 2018.1. About This Book Detect and avoid various attack types that put the privacy of a system at risk Leverage Python to...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Mohit (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham, UK : Packt Publishing, 2018.
Edición:Second edition.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_on1041187915
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 180621t20182018enka o 000 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d STF  |d OCLCF  |d TOH  |d DEBBG  |d CEF  |d G3B  |d S9I  |d N$T  |d YDX  |d OCLCQ  |d UKMGB  |d UAB  |d UKAHL  |d CZL  |d OCLCQ  |d OCLCO  |d OCLCQ 
015 |a GBB8O1555  |2 bnb 
016 7 |a 018897109  |2 Uk 
019 |a 1039295616 
020 |a 9781789136043 
020 |a 1789136040 
020 |z 9781789138962 
020 |z 1789138965 
029 1 |a UKMGB  |b 018897109 
035 |a (OCoLC)1041187915  |z (OCoLC)1039295616 
037 |a CL0500000973  |b Safari Books Online 
050 4 |a QA76.73.P98 
072 7 |a COM  |x 051360  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.133  |2 23 
049 |a UAMI 
100 0 |a Mohit,  |e author. 
245 1 0 |a Python penetration testing essentials :  |b techniques for ethical hacking with Python /  |c Mohit. 
250 |a Second edition. 
264 1 |a Birmingham, UK :  |b Packt Publishing,  |c 2018. 
264 4 |c Ã2018 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file 
588 0 |a Online resource; title from title page (Safari, viewed June 20, 2018). 
520 |a This book gives you the skills you need to use Python for penetration testing, with the help of detailed code examples. This book has been updated for Python 3.6.3 and Kali Linux 2018.1. About This Book Detect and avoid various attack types that put the privacy of a system at risk Leverage Python to build efficient code and eventually build a robust environment Learn about securing wireless applications and information gathering on a web server Who This Book Is For If you are a Python programmer, a security researcher, or an ethical hacker and are interested in penetration testing with the help of Python, then this book is for you. Even if you are new to the field of ethical hacking, this book can help you find the vulnerabilities in your system so that you are ready to tackle any kind of attack or intrusion. What You Will Learn The basics of network pentesting including network scanning and sniffing Wireless, wired attacks, and building traps for attack and torrent detection Web server footprinting and web application attacks, including the XSS and SQL injection attack Wireless frames and how to obtain information such as SSID, BSSID, and the channel number from a wireless frame using a Python script The importance of web server signatures, email gathering, and why knowing the server signature is the first step in hacking In Detail This book gives you the skills you need to use Python for penetration testing (pentesting), with the help of detailed code examples. We start by exploring the basics of networking with Python and then proceed to network hacking. Then, you will delve into exploring Python libraries to perform various types of pentesting and ethical hacking techniques. Next, we delve into hacking the application layer, where we start by gathering information from a website. We then move on to concepts related to website hacking - such as parameter tampering, DDoS, XSS, and SQL injection. By reading this book, you will learn different techniques and methodologies that will familiarize you with Python pentesting techniques, how to protect yourself, and how to create automated programs to find the admin console, SQL injection, and XSS attacks. Style and approach The book starts at a basic level and moves to a higher level of network and web security. The execution and performance of code are both taken into account. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Python (Computer program language) 
650 0 |a Penetration testing (Computer security) 
650 6 |a Python (Langage de programmation) 
650 6 |a Tests d'intrusion. 
650 7 |a Computer security.  |2 bicssc 
650 7 |a Network security.  |2 bicssc 
650 7 |a Programming & scripting languages: general.  |2 bicssc 
650 7 |a COMPUTERS  |x Programming Languages  |x Python.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Penetration testing (Computer security)  |2 fast  |0 (OCoLC)fst01789566 
650 7 |a Python (Computer program language)  |2 fast  |0 (OCoLC)fst01084736 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781789138962/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n BDZ0036924781 
938 |a EBSCOhost  |b EBSC  |n 1823683 
938 |a YBP Library Services  |b YANK  |n 15497361 
994 |a 92  |b IZTAP