Rehim R. - Effective Python Penetration Testing [2016, PDF, ENG]

Видео уроки, книги, учебники по компьютерным сетям и коммуникациям
Торрент Сидеров Личеров Размер
torrent_5427840.torrent
19 6 9.13 МБ
Аватара пользователя
Солнышко
Сообщения: 22944
Зарегистрирован: 13 янв 2016, 22:10

Rehim R. - Effective Python Penetration Testing [2016, PDF, ENG]

Сообщение Солнышко » 28 янв 2018, 17:16

Effective Python Penetration Testing
Год издания: 2016
Автор: Rehim R.
Издательство: Packt Publishing
ISBN: 9781785280696
Язык: Английский
Формат: PDF
Качество: Издательский макет или текст (eBook)
Интерактивное оглавление: Да
Количество страниц: 164
Описание: Penetration testing is a practice of testing a computer system, network, or web application to find weaknesses in security that an attacker can exploit. Effective Python Penetration Testing will help you utilize your Python scripting skills to safeguard your networks from cyberattacks.
We will begin by providing you with an overview of Python scripting and penetration testing. You will learn to analyze network traffic by writing Scapy scripts and will see how to fingerprint web applications with Python libraries such as ProxMon and Spynner.
Moving on, you will find out how to write basic attack scripts, and will develop debugging and reverse engineering skills with Python libraries. Toward the end of the book, you will discover how to utilize cryptography toolkits in Python and how to automate Python tools and libraries.
What You Will Learn
- Write Scapy scripts to investigate network traffic
- Get to know application fingerprinting techniques with Python
- Understand the attack scripting techniques
- Write fuzzing tools with pentesting requirements
- Learn basic attack scripting methods
- Utilize cryptographic toolkits in Python
- Automate pentesting with Python tools and libraries
Table of Contents
1: Python Scripting Essentials
2: Analyzing Network Traffic with Scapy
3: Application Fingerprinting with Python
4: Attack Scripting with Python
5: Fuzzing and Brute-Forcing
6: Debugging and Reverse Engineering
7: Crypto, Hash, and Conversion Functions
8: Keylogging and Screen Grabbing
9: Attack Automation
10: Looking Forward
У вас нет необходимых прав для просмотра вложений в этом сообщении.