Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hands-On Penetration Testing with Python: Enhance your ethical hacking skills to build automated and intelligent systems


Implement defensive techniques in your ecosystem successfully with Python

Key Features

  • Identify and expose vulnerabilities in your infrastructure with Python
  • Learn custom exploit development
  • Make robust and powerful cybersecurity tools with Python

Book Description

With the current technological and infrastructural shift, penetration testing is no longer a process-oriented activity. Modern-day penetration testing demands intensive automation and innovation, and Python is at the forefront. Given the huge number of tools written in Python and its popularity in the penetration testing space, this language has always been the first choice for penetration testers.

Hands-On Penetration Testing with Python starts by taking you through advanced Python programming constructs. Once you are familiar with the core concepts, you'll explore advanced uses of Python in the domain of penetration testing and optimization. You'll then move on to understanding how Python, data science, and the cybersecurity ecosystem communicate with one another. In the concluding chapters, you'll get up to speed with exploit development, reverse engineering, and cybersecurity use cases that can be automated with Python.

By the end of this book, you'll have the skills you need to leverage Python for pentesting and securing infrastructure, while also creating your own custom exploits.

What you will learn

  • Get to grips with custom vulnerability scanner development
  • Learn web application scanning automation and exploit development
  • Discover everyday cybersecurity scenarios that can be automated with Python
  • Explore enterprise or organization-specific use cases and threat-hunting automation
  • Understand reverse engineering, fuzzing, buffer overflows , key-logger development, and exploit development for buffer overflows
  • Study web scraping in Python and use it for processing web responses
  • Explore security operations center (SOC) use cases

Who this book is for

If you are a security consultant, developer or a cyber security enthusiast who wants in-depth insights into how the pentesting ecosystem and Python combine to create offensive tools and exploits, and automate cyber security use-cases, this book is for you. Prior knowledge of Python is not required

Table of Contents

  1. Introduction to Python
  2. Building Python Scripts
  3. Concept Handling
  4. Advanced Python Modules
  5. Vulnerability Scanner Python - Part 1
  6. Vulnerability Scanner Python - Part 2
  7. Machine Learning and Cyber Security
  8. Automating Web Application Scanning - Part 1
  9. Automated Web Application Scanning - Part 2
  10. Building a Custom Crawler
  11. Reverse-Engineering Linux Applications
  12. Reverse Engineering Windows Applications
  13. Exploit Development
  14. Cyber Threat Intelligence
  15. Other Wonders of Python
  16. Assessments
(HTML tags aren't allowed.)

The Art of Film Acting: A  Guide For Actors and Directors
The Art of Film Acting: A Guide For Actors and Directors
This guide for actors and directors develops a valid method for training performers to act from their core--whether they are cold reading, auditioning, or performing for film or television. This book teaches actors how to achieve and respond to believable and honest emotions before the camera, and it maintains that the key to a successful...
WPF Control Development Unleashed: Building Advanced User Experiences
WPF Control Development Unleashed: Building Advanced User Experiences
Imagine that you are an architect who has been asked to build a house on an empty lot in a fairly well-established neighborhood. You take a look at the nearby buildings to make sure that the colors you use on the outside of your house don’t conflict with the aesthetics of the neighborhood. When you are done with your masterpiece of a new...
Fundamentals of Wireless Communication
Fundamentals of Wireless Communication
Wireless communication is one of the most vibrant areas in the communication
field today. While it has been a topic of study since the 1960s,
the past decade has seen a surge of research activities in the area. This is
due to a confluence of several factors. First, there has been an explosive
increase in demand for tetherless

Statistical Data Mining Using SAS Applications, Second Edition
Statistical Data Mining Using SAS Applications, Second Edition

The objective of the second edition of this book is to introduce statistical data mining concepts, describe methods in statistical data mining from sampling to decision trees, demonstrate the features of user-friendly data mining SAS tools and, above all, allow the book users to download compiled data mining SAS (Version 9.0 and...

Computational Methods in Chemical Engineering with Maple
Computational Methods in Chemical Engineering with Maple

This book helps chemical and other engineers develop their skills for solving mathematical models using Maple. These mathematical models can consist of systems of algebraic, ordinary, and partial differential equations. Maple’s ‘dsolve’ is used to obtain solutions for many of these models. Maple worksheets are provided on the...

Artificial Intelligence: Structures and Strategies for Complex Problem Solving (6th Edition)
Artificial Intelligence: Structures and Strategies for Complex Problem Solving (6th Edition)

was very pleased to be asked to produce the sixth edition of my artificial intelligence book. It is a compliment to the earlier editions, started over twenty years ago, that our approach to AI has been so highly valued. It is also exciting that, as new development in the field emerges, we are able to present much of it in each new...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy