Python Penetration Testing Essentials, 2nd Edition

0
(0)

Python Penetration Testing Essentials, 2nd Edition
 

  • Author:Mohit
  • Length: 230 pages
  • Edition: 2nd Revised edition
  • Publisher: Packt Publishing
  • Publication Date: 2018-05-30
  • ISBN-10: 1789138965
  • ISBN-13: 9781789138962
  • Sales Rank: #657802 (See Top 100 Books)
  • Download:Register/Login to Download
  • Buy Print:Buy from amazon


    Book Description

    This book gives you the skills you need to use Python for penetration testing, with the help of detailed code examples. This book has been updated for Python 3.6.3 and Kali Linux 2018.1.

    Key Features

    • Detect and avoid various attack types that put the privacy of a system at risk
    • Leverage Python to build efficient code and eventually build a robust environment
    • Learn about securing wireless applications and information gathering on a web server

    Book Description

    This book gives you the skills you need to use Python for penetration testing (pentesting), with the help of detailed code examples.

    We start by exploring the basics of networking with Python and then proceed to network hacking. Then, you will delve into exploring Python libraries to perform various types of pentesting and ethical hacking techniques. Next, we delve into hacking the application layer, where we start by gathering information from a website. We then move on to concepts related to website hacking―such as parameter tampering, DDoS, XSS, and SQL injection.

    By reading this book, you will learn different techniques and methodologies that will familiarize you with Python pentesting techniques, how to protect yourself, and how to create automated programs to find the admin console, SQL injection, and XSS attacks.

    What you will learn

    • The basics of network pentesting including network scanning and sniffing
    • Wireless, wired attacks, and building traps for attack and torrent detection
    • Web server footprinting and web application attacks, including the XSS and SQL injection attack
    • Wireless frames and how to obtain information such as SSID, BSSID, and the channel number from a wireless frame using a Python script
    • The importance of web server signatures, email gathering, and why knowing the server signature is the first step in hacking

    Who This Book Is For

    If you are a Python programmer, a security researcher, or an ethical hacker and are interested in penetration testing with the help of Python, then this book is for you. Even if you are new to the field of ethical hacking, this book can help you find the vulnerabilities in your system so that you are ready to tackle any kind of attack or intrusion.

    Table of Contents

    1. PYTHON WITH PENETRATION TESTING AND NETWORKING
    2. SCANNING PENTESTING
    3. SNIFFING AND PENETRATION TESTING
    4. Network Attacks and Prevention
    5. WIRELESS PENTESTING
    6. Honeypot, Building A Trap for attackers
    7. FOOTPRINTING OF A WEB SERVER AND A WEB APPLICATION
    8. CLIENT-SIDE AND DDOS ATTACKS
    9. PENTESTING OF SQLI AND XSS

    中文:

    书名:Python Penetration Testing Essentials, 2nd Edition

    本书通过详细的代码示例,为您提供了使用Python进行渗透测试所需的技能。这本书已经针对Python3.6.3和Kali Linux 2018.1进行了更新。

    Key Features

    • 检测并避免各种可能危及系统隐私的攻击类型
    • 利用Python构建高效的代码并最终构建健壮的环境
    • 了解有关保护Web服务器上的无线应用程序和信息收集的信息

    图书描述

    本书通过详细的代码示例,为您提供了使用Python进行渗透测试(五层测试)所需的技能。

    我们从探索使用Python进行网络连接的基础开始,然后继续讨论网络黑客。然后,您将深入研究如何使用Python库来执行各种类型的五层测试和道德黑客技术。接下来,我们将深入研究如何破解应用层,从从网站收集信息开始。然后,我们将继续介绍与网站黑客相关的概念,如参数篡改、DDoS、XSS和SQL注入。

    通过阅读本书,您将学习不同的技术和方法,使您熟悉Python五层测试技术,如何保护您自己,以及如何创建自动程序来查找管理控制台、SQL注入和XSS攻击。

    你将学到什么

    • 网络攻击的基础知识,包括网络扫描和嗅探
    • 无线、有线攻击,以及构建用于攻击和Torrent检测的陷阱
    • Web服务器足迹和Web应用程序攻击,包括XSS和SQL注入攻击
    • 无线帧,以及如何使用Python脚本从无线帧获取SSID、BSSID和信道号等信息
    • Web服务器签名、电子邮件收集的重要性,以及为什么知道服务器签名是黑客攻击的第一步

    Who This Book Is For

    如果您是一名Python程序员、安全研究员或道德黑客,并且对借助Python进行渗透测试感兴趣,那么这本书是为您而写的。即使你是道德黑客领域的新手,这本书也可以帮助你找到系统中的漏洞,以便你准备好应对任何类型的攻击或入侵。

    目录表

    1. PYTHON WITH PENETRATION TESTING AND NETWORKING
    2. 扫描五次测试
    3. 嗅探和渗透测试
    4. 网络攻击与防范
    5. 无线五层测试
    6. 蜜罐,为攻击者搭建陷阱
    7. Web服务器和Web应用程序的足迹
    8. 客户端和DDOS攻击
    9. SQLI和XSS的赋值
  • 下载电子版:下载地址
  • 购买纸质版:亚马逊商城

    点击星号评分!

    平均分 0 / 5. 投票数: 0

    还没有投票!请为他投一票。

  • 推荐阅读

    评论 抢沙发

    评论前必须登录!

     

    登录

    找回密码

    注册