Cargando…

Learning Python Web Penetration Testing : Automate Web Penetration Testing Activities Using Python.

Chapter 5: Password Testing; How password attacks work; Password cracking; Password policies and account locking; Our first password BruteForcer; Basic authentication; Creating the password cracker; Adding support for digest authentication; What is digest authentication?; Adding digest authenticatio...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Martorella, Christian
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Publishing Ltd, 2018.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mi 4500
001 EBOOKCENTRAL_on1043620514
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |n|---|||||
008 180707s2018 enk o 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d MERUC  |d IDB  |d NLE  |d CHVBK  |d OCLCQ  |d LVT  |d UKAHL  |d OCLCQ  |d UX1  |d K6U  |d SIITE  |d OCLCF  |d OCLCQ  |d OCLCO  |d OCLCL 
019 |a 1082154780  |a 1175641722 
020 |a 9781789539677 
020 |a 1789539676 
020 |a 9781789533972 
020 |a 178953397X  |q (Trade Paper) 
024 3 |a 9781789533972 
029 1 |a AU@  |b 000066232966 
029 1 |a CHNEW  |b 001023822 
029 1 |a CHVBK  |b 530322781 
035 |a (OCoLC)1043620514  |z (OCoLC)1082154780  |z (OCoLC)1175641722 
037 |a B11405  |b 01201872 
050 4 |a QA76.73.P98  |b .M378 2018eb 
082 0 4 |a 005.133  |2 23 
049 |a UAMI 
100 1 |a Martorella, Christian. 
245 1 0 |a Learning Python Web Penetration Testing :  |b Automate Web Penetration Testing Activities Using Python. 
260 |a Birmingham :  |b Packt Publishing Ltd,  |c 2018. 
300 |a 1 online resource (132 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
505 0 |a Cover; Title Page; Copyright and Credits; Packt Upsell; Contributor; Table of Contents; Preface; Chapter 1: Introduction to Web Application Penetration Testing; Understanding the web application penetration testing process; Typical web application toolkit; HTTP Proxy; Crawlers and spiders; Vulnerability scanners; Brute forces/predictable resource locators; Specific task tools; Testing environment; Summary; Chapter 2: Interacting with Web Applications; HTTP protocol basics; What is HTTP and how it works?; Anatomy of an HTTP request; HTTP headers; GET request. 
505 8 |a Interacting with a web app using the requests libraryRequests library; Our first script; Setting headers; Analyzing HTTP responses; HTTP codes; Summary; Chapter 3: Web Crawling with Scrapy -- Mapping the Application; Web application mapping; Creating our own crawler/spider with Scrapy; Starting with Scrapy; Making our crawler recursive; Scraping interesting stuff; Summary; Chapter 4: Resources Discovery; What is resource discovery?; Building our first BruteForcer ; Analysing the results; Adding more information; Entering the hash of the response content; Taking screenshots of the findings. 
520 |a Chapter 5: Password Testing; How password attacks work; Password cracking; Password policies and account locking; Our first password BruteForcer; Basic authentication; Creating the password cracker; Adding support for digest authentication; What is digest authentication?; Adding digest authentication to our script; Form-based authentication; Form-based authentication overview; Summary; Chapter 6: Detecting and Exploiting SQL Injection Vulnerabilities; Introduction to SQL injection; SQLi versus blind SQLi; Detecting SQL injection issues; Methods for detecting SQLi. 
505 8 |a Automating the detectionExploiting a SQL injection to extract data; What data can we extract with an SQLi?; Automating basic extractions; Advanced SQLi exploiting; Summary; Chapter 7: Intercepting HTTP Requests; HTTP proxy anatomy; What is an HTTP proxy?; Why do we need a proxy?; Types of HTTP proxy; Introduction to mitmproxy; Why mitmproxy?; Manipulating HTTP requests; Inline scripts; Automating SQLi in mitmproxy; SQLi process; Summary; Other Books You May Enjoy; Index. 
520 |a This book will walk you through the web application penetration testing methodology, showing you how to write your own tools with Python for every main activity in the process. It will show you how to test for security vulnerabilities in web applications just like security professionals and hackers do. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Python. 
650 0 |a Penetration testing. 
650 7 |a Computer security.  |2 bicssc 
650 7 |a Network security.  |2 bicssc 
650 7 |a Programming & scripting languages: general.  |2 bicssc 
650 7 |a Computers  |x Networking  |x Security.  |2 bisacsh 
650 7 |a Computers  |x Programming Languages  |x Python.  |2 bisacsh 
650 7 |a Computers  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Penetration testing (Computer security)  |2 fast 
650 7 |a Python (Computer program language)  |2 fast 
758 |i has work:  |a Learning Python Web Penetration Testing (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCYBTrQq8DwRFKkvYBRYCKm  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Martorella, Christian.  |t Learning Python Web Penetration Testing : Automate Web Penetration Testing Activities Using Python.  |d Birmingham : Packt Publishing Ltd, ©2018  |z 9781789533972 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=5439460  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n BDZ0037017831 
938 |a EBL - Ebook Library  |b EBLB  |n EBL5439460 
994 |a 92  |b IZTAP