Effective Python penetration testing pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools
Pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and toolsAbout This Book Learn to utilize your Python scripting skills to pentest a computer system, network, and web-application Get proficient at the art of assessing vulnerabilities by conducting...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham
Packt Publishing
2016
|
Schriftenreihe: | Community experience distilled
|
Schlagworte: | |
Online-Zugang: | lizenzpflichtig |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047692901 | ||
003 | DE-627-1 | ||
005 | 20240228120130.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2016 xx |||||o 00| ||eng c | ||
020 | |a 9781785280962 |c electronic bk. |9 978-1-78528-096-2 | ||
020 | |a 1785280961 |c electronic bk. |9 1-78528-096-1 | ||
020 | |a 9781785280696 |9 978-1-78528-069-6 | ||
035 | |a (DE-627-1)047692901 | ||
035 | |a (DE-599)KEP047692901 | ||
035 | |a (ORHE)9781785280696 | ||
035 | |a (DE-627-1)047692901 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Rehim, Rejah |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Effective Python penetration testing |b pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools |c Rejah Rehim |
264 | 1 | |a Birmingham |b Packt Publishing |c 2016 | |
300 | |a 1 online resource |b illustrations. | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a Community experience distilled | |
500 | |a Online resource; title from PDF title page (EBSCO, viewed March 1, 2017) | ||
520 | |a Pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and toolsAbout This Book Learn to utilize your Python scripting skills to pentest a computer system, network, and web-application Get proficient at the art of assessing vulnerabilities by conducting effective penetration testing This is the ultimate guide that teaches you how to use Python to protect your systems against sophisticated cyber attacksWho This Book Is For This book is ideal for those who are comfortable with Python or a similar language and need no help with basic programming concepts, but want to understand the basics of penetration testing and the problems pentesters face. What You Will Learn Write Scapy scripts to investigate network traffic Get to know application fingerprinting techniques with Python Understand the attack scripting techniques Write fuzzing tools with pentesting requirements Learn basic attack scripting methods Utilize cryptographic toolkits in Python Automate pentesting with Python tools and librariesIn Detail Penetration testing is a practice of testing a computer system, network, or web application to find weaknesses in security that an attacker can exploit. Effective Python Penetration Testing will help you utilize your Python scripting skills to safeguard your networks from cyberattacks. We will begin by providing you with an overview of Python scripting and penetration testing. You will learn to analyze network traffic by writing Scapy scripts and will see how to fingerprint web applications with Python libraries such as ProxMon and Spynner. Moving on, you will find out how to write basic attack scripts, and will develop debugging and reverse engineering skills with Python libraries. Toward the end of the book, you will discover how to utilize cryptography toolkits in Python and how to automate Python tools and libraries. Style and approach This is an expert's guide to Python with a practical based approach, where each chapter will help you improve your penetration testing skills using Python to become a master pen tester. | ||
650 | 0 | |a Penetration testing (Computer security) | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Python (Computer program language) | |
650 | 4 | |a Tests d'intrusion | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Python (Langage de programmation) | |
650 | 4 | |a COMPUTERS ; Security ; Networking | |
650 | 4 | |a Penetration testing (Computer security) | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Python (Computer program language) | |
776 | 1 | |z 1785280694 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1785280694 |
856 | 4 | 0 | |l TUM01 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781785280696/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047692901 |
---|---|
_version_ | 1818767296178421760 |
adam_text | |
any_adam_object | |
author | Rehim, Rejah |
author_facet | Rehim, Rejah |
author_role | aut |
author_sort | Rehim, Rejah |
author_variant | r r rr |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047692901 (DE-599)KEP047692901 (ORHE)9781785280696 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04117cam a22005292 4500</leader><controlfield tag="001">ZDB-30-ORH-047692901</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120130.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2016 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781785280962</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-78528-096-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1785280961</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-78528-096-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781785280696</subfield><subfield code="9">978-1-78528-069-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047692901</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047692901</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781785280696</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047692901</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Rehim, Rejah</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Effective Python penetration testing</subfield><subfield code="b">pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools</subfield><subfield code="c">Rejah Rehim</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield><subfield code="b">illustrations.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Community experience distilled</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; title from PDF title page (EBSCO, viewed March 1, 2017)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and toolsAbout This Book Learn to utilize your Python scripting skills to pentest a computer system, network, and web-application Get proficient at the art of assessing vulnerabilities by conducting effective penetration testing This is the ultimate guide that teaches you how to use Python to protect your systems against sophisticated cyber attacksWho This Book Is For This book is ideal for those who are comfortable with Python or a similar language and need no help with basic programming concepts, but want to understand the basics of penetration testing and the problems pentesters face. What You Will Learn Write Scapy scripts to investigate network traffic Get to know application fingerprinting techniques with Python Understand the attack scripting techniques Write fuzzing tools with pentesting requirements Learn basic attack scripting methods Utilize cryptographic toolkits in Python Automate pentesting with Python tools and librariesIn Detail Penetration testing is a practice of testing a computer system, network, or web application to find weaknesses in security that an attacker can exploit. Effective Python Penetration Testing will help you utilize your Python scripting skills to safeguard your networks from cyberattacks. We will begin by providing you with an overview of Python scripting and penetration testing. You will learn to analyze network traffic by writing Scapy scripts and will see how to fingerprint web applications with Python libraries such as ProxMon and Spynner. Moving on, you will find out how to write basic attack scripts, and will develop debugging and reverse engineering skills with Python libraries. Toward the end of the book, you will discover how to utilize cryptography toolkits in Python and how to automate Python tools and libraries. Style and approach This is an expert's guide to Python with a practical based approach, where each chapter will help you improve your penetration testing skills using Python to become a master pen tester.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Python (Computer program language)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Tests d'intrusion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Python (Langage de programmation)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; Networking</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Python (Computer program language)</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">1785280694</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1785280694</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781785280696/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047692901 |
illustrated | Illustrated |
indexdate | 2024-12-18T08:47:37Z |
institution | BVB |
isbn | 9781785280962 1785280961 9781785280696 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource illustrations. |
psigel | ZDB-30-ORH |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Packt Publishing |
record_format | marc |
series2 | Community experience distilled |
spelling | Rehim, Rejah VerfasserIn aut Effective Python penetration testing pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools Rejah Rehim Birmingham Packt Publishing 2016 1 online resource illustrations. Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Community experience distilled Online resource; title from PDF title page (EBSCO, viewed March 1, 2017) Pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and toolsAbout This Book Learn to utilize your Python scripting skills to pentest a computer system, network, and web-application Get proficient at the art of assessing vulnerabilities by conducting effective penetration testing This is the ultimate guide that teaches you how to use Python to protect your systems against sophisticated cyber attacksWho This Book Is For This book is ideal for those who are comfortable with Python or a similar language and need no help with basic programming concepts, but want to understand the basics of penetration testing and the problems pentesters face. What You Will Learn Write Scapy scripts to investigate network traffic Get to know application fingerprinting techniques with Python Understand the attack scripting techniques Write fuzzing tools with pentesting requirements Learn basic attack scripting methods Utilize cryptographic toolkits in Python Automate pentesting with Python tools and librariesIn Detail Penetration testing is a practice of testing a computer system, network, or web application to find weaknesses in security that an attacker can exploit. Effective Python Penetration Testing will help you utilize your Python scripting skills to safeguard your networks from cyberattacks. We will begin by providing you with an overview of Python scripting and penetration testing. You will learn to analyze network traffic by writing Scapy scripts and will see how to fingerprint web applications with Python libraries such as ProxMon and Spynner. Moving on, you will find out how to write basic attack scripts, and will develop debugging and reverse engineering skills with Python libraries. Toward the end of the book, you will discover how to utilize cryptography toolkits in Python and how to automate Python tools and libraries. Style and approach This is an expert's guide to Python with a practical based approach, where each chapter will help you improve your penetration testing skills using Python to become a master pen tester. Penetration testing (Computer security) Computer networks Security measures Python (Computer program language) Tests d'intrusion Réseaux d'ordinateurs ; Sécurité ; Mesures Python (Langage de programmation) COMPUTERS ; Security ; Networking Computer networks ; Security measures 1785280694 Erscheint auch als Druck-Ausgabe 1785280694 TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781785280696/?ar X:ORHE Aggregator lizenzpflichtig Volltext |
spellingShingle | Rehim, Rejah Effective Python penetration testing pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools Penetration testing (Computer security) Computer networks Security measures Python (Computer program language) Tests d'intrusion Réseaux d'ordinateurs ; Sécurité ; Mesures Python (Langage de programmation) COMPUTERS ; Security ; Networking Computer networks ; Security measures |
title | Effective Python penetration testing pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools |
title_auth | Effective Python penetration testing pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools |
title_exact_search | Effective Python penetration testing pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools |
title_full | Effective Python penetration testing pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools Rejah Rehim |
title_fullStr | Effective Python penetration testing pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools Rejah Rehim |
title_full_unstemmed | Effective Python penetration testing pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools Rejah Rehim |
title_short | Effective Python penetration testing |
title_sort | effective python penetration testing pen test your system like a pro and overcome vulnerabilities by leveraging python scripts libraries and tools |
title_sub | pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools |
topic | Penetration testing (Computer security) Computer networks Security measures Python (Computer program language) Tests d'intrusion Réseaux d'ordinateurs ; Sécurité ; Mesures Python (Langage de programmation) COMPUTERS ; Security ; Networking Computer networks ; Security measures |
topic_facet | Penetration testing (Computer security) Computer networks Security measures Python (Computer program language) Tests d'intrusion Réseaux d'ordinateurs ; Sécurité ; Mesures Python (Langage de programmation) COMPUTERS ; Security ; Networking Computer networks ; Security measures |
url | https://learning.oreilly.com/library/view/-/9781785280696/?ar |
work_keys_str_mv | AT rehimrejah effectivepythonpenetrationtestingpentestyoursystemlikeaproandovercomevulnerabilitiesbyleveragingpythonscriptslibrariesandtools |