Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hands-On Penetration Testing with Python: Enhance your ethical hacking skills to build automated and intelligent systems

Buy

Implement defensive techniques in your ecosystem successfully with Python

Key Features

  • Identify and expose vulnerabilities in your infrastructure with Python
  • Learn custom exploit development
  • Make robust and powerful cybersecurity tools with Python

Book Description

With the current technological and infrastructural shift, penetration testing is no longer a process-oriented activity. Modern-day penetration testing demands intensive automation and innovation, and Python is at the forefront. Given the huge number of tools written in Python and its popularity in the penetration testing space, this language has always been the first choice for penetration testers.

Hands-On Penetration Testing with Python starts by taking you through advanced Python programming constructs. Once you are familiar with the core concepts, you'll explore advanced uses of Python in the domain of penetration testing and optimization. You'll then move on to understanding how Python, data science, and the cybersecurity ecosystem communicate with one another. In the concluding chapters, you'll get up to speed with exploit development, reverse engineering, and cybersecurity use cases that can be automated with Python.

By the end of this book, you'll have the skills you need to leverage Python for pentesting and securing infrastructure, while also creating your own custom exploits.

What you will learn

  • Get to grips with custom vulnerability scanner development
  • Learn web application scanning automation and exploit development
  • Discover everyday cybersecurity scenarios that can be automated with Python
  • Explore enterprise or organization-specific use cases and threat-hunting automation
  • Understand reverse engineering, fuzzing, buffer overflows , key-logger development, and exploit development for buffer overflows
  • Study web scraping in Python and use it for processing web responses
  • Explore security operations center (SOC) use cases

Who this book is for

If you are a security consultant, developer or a cyber security enthusiast who wants in-depth insights into how the pentesting ecosystem and Python combine to create offensive tools and exploits, and automate cyber security use-cases, this book is for you. Prior knowledge of Python is not required

Table of Contents

  1. Introduction to Python
  2. Building Python Scripts
  3. Concept Handling
  4. Advanced Python Modules
  5. Vulnerability Scanner Python - Part 1
  6. Vulnerability Scanner Python - Part 2
  7. Machine Learning and Cyber Security
  8. Automating Web Application Scanning - Part 1
  9. Automated Web Application Scanning - Part 2
  10. Building a Custom Crawler
  11. Reverse-Engineering Linux Applications
  12. Reverse Engineering Windows Applications
  13. Exploit Development
  14. Cyber Threat Intelligence
  15. Other Wonders of Python
  16. Assessments
(HTML tags aren't allowed.)

Learn MYSQL: Learn MYSQL For Beginners: Learn How To Create An Address Book Using Php And Mysql
Learn MYSQL: Learn MYSQL For Beginners: Learn How To Create An Address Book Using Php And Mysql

This is the fastest beginner's guide to PHP and MYSQL programming.

The author clarifies things in your opinion so that you don't need to study some specific technique being used in PHP. To keep things as simple as possible, we won't use any complex systems. Besides, he will not focus on website design because...

Practical Internet Server Configuration: Learn to Build a Fully Functional and Well-Secured Enterprise Class Internet Server
Practical Internet Server Configuration: Learn to Build a Fully Functional and Well-Secured Enterprise Class Internet Server
Learn the skills to complete the full installation, configuration, and maintenance of an enterprise class internet server, no matter what Unix-like operating system you prefer. This book will rapidly guide you towards real system administration, with clear explanations along the way.

After a chapter explaining the most...

Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework

Master Wireshark to solve real-world security problems

If you don’t already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging network issues. This book extends that power to information security...


Docker Cookbook: Over 100 practical and insightful recipes to build distributed applications with Docker , 2nd Edition
Docker Cookbook: Over 100 practical and insightful recipes to build distributed applications with Docker , 2nd Edition

Leverage Docker to deploying software at scale

Key Features

  • Leverage practical examples to manage containers efficiently
  • Integrate with orchestration tools such as Kubernetes for controlled deployments
  • Learn to implement best practices on improving...
Start-Up Secure: Baking Cybersecurity into Your Company from Founding to Exit
Start-Up Secure: Baking Cybersecurity into Your Company from Founding to Exit

Add cybersecurity to your value proposition and protect your company from cyberattacks

Cybersecurity is now a requirement for every company in the world regardless of size or industry. Start-Up Secure: Baking Cybersecurity into Your Company from Founding to Exit covers everything a founder, entrepreneur and...

Python All-in-One For Dummies
Python All-in-One For Dummies

The one-stop resource for all your Python queries

Powerful and flexible, Python is one of the most popular programming languages in the world. It's got all the right stuff for the software driving the cutting-edge of the development world?machine learning, robotics, artificial intelligence, data science, etc....

©2021 LearnIT (support@pdfchm.net) - Privacy Policy