Effective Python penetration testing pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools

Pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and toolsAbout This Book Learn to utilize your Python scripting skills to pentest a computer system, network, and web-application Get proficient at the art of assessing vulnerabilities by conducting...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Rehim, Rejah (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Birmingham Packt Publishing 2016
Schriftenreihe:Community experience distilled
Schlagworte:
Online-Zugang:lizenzpflichtig
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000cam a22000002 4500
001 ZDB-30-ORH-047692901
003 DE-627-1
005 20240228120130.0
007 cr uuu---uuuuu
008 191023s2016 xx |||||o 00| ||eng c
020 |a 9781785280962  |c electronic bk.  |9 978-1-78528-096-2 
020 |a 1785280961  |c electronic bk.  |9 1-78528-096-1 
020 |a 9781785280696  |9 978-1-78528-069-6 
035 |a (DE-627-1)047692901 
035 |a (DE-599)KEP047692901 
035 |a (ORHE)9781785280696 
035 |a (DE-627-1)047692901 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
072 7 |a COM  |2 bisacsh 
082 0 |a 005.8  |2 23 
100 1 |a Rehim, Rejah  |e VerfasserIn  |4 aut 
245 1 0 |a Effective Python penetration testing  |b pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools  |c Rejah Rehim 
264 1 |a Birmingham  |b Packt Publishing  |c 2016 
300 |a 1 online resource  |b illustrations. 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
490 0 |a Community experience distilled 
500 |a Online resource; title from PDF title page (EBSCO, viewed March 1, 2017) 
520 |a Pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and toolsAbout This Book Learn to utilize your Python scripting skills to pentest a computer system, network, and web-application Get proficient at the art of assessing vulnerabilities by conducting effective penetration testing This is the ultimate guide that teaches you how to use Python to protect your systems against sophisticated cyber attacksWho This Book Is For This book is ideal for those who are comfortable with Python or a similar language and need no help with basic programming concepts, but want to understand the basics of penetration testing and the problems pentesters face. What You Will Learn Write Scapy scripts to investigate network traffic Get to know application fingerprinting techniques with Python Understand the attack scripting techniques Write fuzzing tools with pentesting requirements Learn basic attack scripting methods Utilize cryptographic toolkits in Python Automate pentesting with Python tools and librariesIn Detail Penetration testing is a practice of testing a computer system, network, or web application to find weaknesses in security that an attacker can exploit. Effective Python Penetration Testing will help you utilize your Python scripting skills to safeguard your networks from cyberattacks. We will begin by providing you with an overview of Python scripting and penetration testing. You will learn to analyze network traffic by writing Scapy scripts and will see how to fingerprint web applications with Python libraries such as ProxMon and Spynner. Moving on, you will find out how to write basic attack scripts, and will develop debugging and reverse engineering skills with Python libraries. Toward the end of the book, you will discover how to utilize cryptography toolkits in Python and how to automate Python tools and libraries. Style and approach This is an expert's guide to Python with a practical based approach, where each chapter will help you improve your penetration testing skills using Python to become a master pen tester. 
650 0 |a Penetration testing (Computer security) 
650 0 |a Computer networks  |x Security measures 
650 0 |a Python (Computer program language) 
650 4 |a Tests d'intrusion 
650 4 |a Réseaux d'ordinateurs ; Sécurité ; Mesures 
650 4 |a Python (Langage de programmation) 
650 4 |a COMPUTERS ; Security ; Networking 
650 4 |a Penetration testing (Computer security) 
650 4 |a Computer networks ; Security measures 
650 4 |a Python (Computer program language) 
776 1 |z 1785280694 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 1785280694 
856 4 0 |l TUM01  |p ZDB-30-ORH  |q TUM_PDA_ORH  |u https://learning.oreilly.com/library/view/-/9781785280696/?ar  |m X:ORHE  |x Aggregator  |z lizenzpflichtig  |3 Volltext 
912 |a ZDB-30-ORH 
912 |a ZDB-30-ORH 
951 |a BO 
912 |a ZDB-30-ORH 
049 |a DE-91 

Datensatz im Suchindex

DE-BY-TUM_katkey ZDB-30-ORH-047692901
_version_ 1818767296178421760
adam_text
any_adam_object
author Rehim, Rejah
author_facet Rehim, Rejah
author_role aut
author_sort Rehim, Rejah
author_variant r r rr
building Verbundindex
bvnumber localTUM
collection ZDB-30-ORH
ctrlnum (DE-627-1)047692901
(DE-599)KEP047692901
(ORHE)9781785280696
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04117cam a22005292 4500</leader><controlfield tag="001">ZDB-30-ORH-047692901</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120130.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2016 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781785280962</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-78528-096-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1785280961</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-78528-096-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781785280696</subfield><subfield code="9">978-1-78528-069-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047692901</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047692901</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781785280696</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047692901</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Rehim, Rejah</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Effective Python penetration testing</subfield><subfield code="b">pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools</subfield><subfield code="c">Rejah Rehim</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield><subfield code="b">illustrations.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Community experience distilled</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; title from PDF title page (EBSCO, viewed March 1, 2017)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and toolsAbout This Book Learn to utilize your Python scripting skills to pentest a computer system, network, and web-application Get proficient at the art of assessing vulnerabilities by conducting effective penetration testing This is the ultimate guide that teaches you how to use Python to protect your systems against sophisticated cyber attacksWho This Book Is For This book is ideal for those who are comfortable with Python or a similar language and need no help with basic programming concepts, but want to understand the basics of penetration testing and the problems pentesters face. What You Will Learn Write Scapy scripts to investigate network traffic Get to know application fingerprinting techniques with Python Understand the attack scripting techniques Write fuzzing tools with pentesting requirements Learn basic attack scripting methods Utilize cryptographic toolkits in Python Automate pentesting with Python tools and librariesIn Detail Penetration testing is a practice of testing a computer system, network, or web application to find weaknesses in security that an attacker can exploit. Effective Python Penetration Testing will help you utilize your Python scripting skills to safeguard your networks from cyberattacks. We will begin by providing you with an overview of Python scripting and penetration testing. You will learn to analyze network traffic by writing Scapy scripts and will see how to fingerprint web applications with Python libraries such as ProxMon and Spynner. Moving on, you will find out how to write basic attack scripts, and will develop debugging and reverse engineering skills with Python libraries. Toward the end of the book, you will discover how to utilize cryptography toolkits in Python and how to automate Python tools and libraries. Style and approach This is an expert's guide to Python with a practical based approach, where each chapter will help you improve your penetration testing skills using Python to become a master pen tester.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Python (Computer program language)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Tests d'intrusion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Python (Langage de programmation)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; Networking</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Python (Computer program language)</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">1785280694</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1785280694</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781785280696/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection>
id ZDB-30-ORH-047692901
illustrated Illustrated
indexdate 2024-12-18T08:47:37Z
institution BVB
isbn 9781785280962
1785280961
9781785280696
language English
open_access_boolean
owner DE-91
DE-BY-TUM
owner_facet DE-91
DE-BY-TUM
physical 1 online resource illustrations.
psigel ZDB-30-ORH
publishDate 2016
publishDateSearch 2016
publishDateSort 2016
publisher Packt Publishing
record_format marc
series2 Community experience distilled
spelling Rehim, Rejah VerfasserIn aut
Effective Python penetration testing pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools Rejah Rehim
Birmingham Packt Publishing 2016
1 online resource illustrations.
Text txt rdacontent
Computermedien c rdamedia
Online-Ressource cr rdacarrier
Community experience distilled
Online resource; title from PDF title page (EBSCO, viewed March 1, 2017)
Pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and toolsAbout This Book Learn to utilize your Python scripting skills to pentest a computer system, network, and web-application Get proficient at the art of assessing vulnerabilities by conducting effective penetration testing This is the ultimate guide that teaches you how to use Python to protect your systems against sophisticated cyber attacksWho This Book Is For This book is ideal for those who are comfortable with Python or a similar language and need no help with basic programming concepts, but want to understand the basics of penetration testing and the problems pentesters face. What You Will Learn Write Scapy scripts to investigate network traffic Get to know application fingerprinting techniques with Python Understand the attack scripting techniques Write fuzzing tools with pentesting requirements Learn basic attack scripting methods Utilize cryptographic toolkits in Python Automate pentesting with Python tools and librariesIn Detail Penetration testing is a practice of testing a computer system, network, or web application to find weaknesses in security that an attacker can exploit. Effective Python Penetration Testing will help you utilize your Python scripting skills to safeguard your networks from cyberattacks. We will begin by providing you with an overview of Python scripting and penetration testing. You will learn to analyze network traffic by writing Scapy scripts and will see how to fingerprint web applications with Python libraries such as ProxMon and Spynner. Moving on, you will find out how to write basic attack scripts, and will develop debugging and reverse engineering skills with Python libraries. Toward the end of the book, you will discover how to utilize cryptography toolkits in Python and how to automate Python tools and libraries. Style and approach This is an expert's guide to Python with a practical based approach, where each chapter will help you improve your penetration testing skills using Python to become a master pen tester.
Penetration testing (Computer security)
Computer networks Security measures
Python (Computer program language)
Tests d'intrusion
Réseaux d'ordinateurs ; Sécurité ; Mesures
Python (Langage de programmation)
COMPUTERS ; Security ; Networking
Computer networks ; Security measures
1785280694
Erscheint auch als Druck-Ausgabe 1785280694
TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781785280696/?ar X:ORHE Aggregator lizenzpflichtig Volltext
spellingShingle Rehim, Rejah
Effective Python penetration testing pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools
Penetration testing (Computer security)
Computer networks Security measures
Python (Computer program language)
Tests d'intrusion
Réseaux d'ordinateurs ; Sécurité ; Mesures
Python (Langage de programmation)
COMPUTERS ; Security ; Networking
Computer networks ; Security measures
title Effective Python penetration testing pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools
title_auth Effective Python penetration testing pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools
title_exact_search Effective Python penetration testing pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools
title_full Effective Python penetration testing pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools Rejah Rehim
title_fullStr Effective Python penetration testing pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools Rejah Rehim
title_full_unstemmed Effective Python penetration testing pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools Rejah Rehim
title_short Effective Python penetration testing
title_sort effective python penetration testing pen test your system like a pro and overcome vulnerabilities by leveraging python scripts libraries and tools
title_sub pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools
topic Penetration testing (Computer security)
Computer networks Security measures
Python (Computer program language)
Tests d'intrusion
Réseaux d'ordinateurs ; Sécurité ; Mesures
Python (Langage de programmation)
COMPUTERS ; Security ; Networking
Computer networks ; Security measures
topic_facet Penetration testing (Computer security)
Computer networks Security measures
Python (Computer program language)
Tests d'intrusion
Réseaux d'ordinateurs ; Sécurité ; Mesures
Python (Langage de programmation)
COMPUTERS ; Security ; Networking
Computer networks ; Security measures
url https://learning.oreilly.com/library/view/-/9781785280696/?ar
work_keys_str_mv AT rehimrejah effectivepythonpenetrationtestingpentestyoursystemlikeaproandovercomevulnerabilitiesbyleveragingpythonscriptslibrariesandtools