Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hands-On Penetration Testing with Python: Enhance your ethical hacking skills to build automated and intelligent systems


Implement defensive techniques in your ecosystem successfully with Python

Key Features

  • Identify and expose vulnerabilities in your infrastructure with Python
  • Learn custom exploit development
  • Make robust and powerful cybersecurity tools with Python

Book Description

With the current technological and infrastructural shift, penetration testing is no longer a process-oriented activity. Modern-day penetration testing demands intensive automation and innovation, and Python is at the forefront. Given the huge number of tools written in Python and its popularity in the penetration testing space, this language has always been the first choice for penetration testers.

Hands-On Penetration Testing with Python starts by taking you through advanced Python programming constructs. Once you are familiar with the core concepts, you'll explore advanced uses of Python in the domain of penetration testing and optimization. You'll then move on to understanding how Python, data science, and the cybersecurity ecosystem communicate with one another. In the concluding chapters, you'll get up to speed with exploit development, reverse engineering, and cybersecurity use cases that can be automated with Python.

By the end of this book, you'll have the skills you need to leverage Python for pentesting and securing infrastructure, while also creating your own custom exploits.

What you will learn

  • Get to grips with custom vulnerability scanner development
  • Learn web application scanning automation and exploit development
  • Discover everyday cybersecurity scenarios that can be automated with Python
  • Explore enterprise or organization-specific use cases and threat-hunting automation
  • Understand reverse engineering, fuzzing, buffer overflows , key-logger development, and exploit development for buffer overflows
  • Study web scraping in Python and use it for processing web responses
  • Explore security operations center (SOC) use cases

Who this book is for

If you are a security consultant, developer or a cyber security enthusiast who wants in-depth insights into how the pentesting ecosystem and Python combine to create offensive tools and exploits, and automate cyber security use-cases, this book is for you. Prior knowledge of Python is not required

Table of Contents

  1. Introduction to Python
  2. Building Python Scripts
  3. Concept Handling
  4. Advanced Python Modules
  5. Vulnerability Scanner Python - Part 1
  6. Vulnerability Scanner Python - Part 2
  7. Machine Learning and Cyber Security
  8. Automating Web Application Scanning - Part 1
  9. Automated Web Application Scanning - Part 2
  10. Building a Custom Crawler
  11. Reverse-Engineering Linux Applications
  12. Reverse Engineering Windows Applications
  13. Exploit Development
  14. Cyber Threat Intelligence
  15. Other Wonders of Python
  16. Assessments
(HTML tags aren't allowed.)

TCP/IP Unleashed (3rd Edition)
TCP/IP Unleashed (3rd Edition)

TCP/IP Unleashed, Third Edition, explains the features and complexities of the TCP/IP protocol suite in a comprehensive, logical format. The book is designed for easy reference and incorporates step-by-step guidelines and configuration examples to enhance the reader's learning experience. Our expert authors walk through the fundamentals of...

The Assembly Programming Master Book
The Assembly Programming Master Book

Aiming to prove that writing programs for Windows in the Assembly language is no more difficult than writing the same programs using C/C++, this guide shows how Assembly code is actually more compact and executes faster. The algorithmic knowledge and skills lost in high-level programming provides the justification demonstrated in this guide for...

Strategies and Tools for Corporate Blogging
Strategies and Tools for Corporate Blogging
While this book describes some of the benefits of corporate blogging, the book’s focus is to give the reader the tools and strategies to develop expertise in how to build a successful corporate blog. This book is not about why blogging is necessary for a company per se; rather, the focus is on enabling the reader to conduct effective...

Algebraic Approximation: A Guide to Past and Current Solutions (Frontiers in Mathematics)
Algebraic Approximation: A Guide to Past and Current Solutions (Frontiers in Mathematics)

This book contains an exposition of several results related with direct and converse theorems in the theory of approximation by algebraic polynomials in a finite interval. In addition, some facts concerning trigonometric approximation that are necessary for motivation and comparisons are included. The selection of papers that are referenced...

Conjugation Reactions In Drug Metabolism: An Integrated Approach
Conjugation Reactions In Drug Metabolism: An Integrated Approach
‘The conjugations may well be the most important drug biotransformation reactions.’ Thus reads the first sentence in Chapter 1 of this book; and indeed, this may be little realized, if one compares the overwhelming attention paid to cytochrome P-450-mediated biotransformation with what is published on the conjugations. Yet, oxidative...
Designing Digital Games: Create Games with Scratch! (Dummies Junior)
Designing Digital Games: Create Games with Scratch! (Dummies Junior)
The easy way for kids to get started with video game design

Is your youngster a designer at heart? Read on! Designing Digital Games helps children apply their design skills to video game design using Scratch—and this book! Introducing simple programming concepts over the course of three easy-to-follow projects,...

©2020 LearnIT (support@pdfchm.net) - Privacy Policy