Articles liés à Hands-On Penetration Testing with Python: Enhance your...

Hands-On Penetration Testing with Python: Enhance your ethical hacking skills to build automated and intelligent systems - Couverture souple

 
9781788990820: Hands-On Penetration Testing with Python: Enhance your ethical hacking skills to build automated and intelligent systems

Synopsis

Implement defensive techniques in your ecosystem successfully with Python

Key Features

  • Identify and expose vulnerabilities in your infrastructure with Python
  • Learn custom exploit development .
  • Make robust and powerful cybersecurity tools with Python

Book Description

With the current technological and infrastructural shift, penetration testing is no longer a process-oriented activity. Modern-day penetration testing demands lots of automation and innovation; the only language that dominates all its peers is Python. Given the huge number of tools written in Python, and its popularity in the penetration testing space, this language has always been the first choice for penetration testers.

Hands-On Penetration Testing with Python walks you through advanced Python programming constructs. Once you are familiar with the core concepts, you'll explore the advanced uses of Python in the domain of penetration testing and optimization. You'll then move on to understanding how Python, data science, and the cybersecurity ecosystem communicate with one another. In the concluding chapters, you'll study exploit development, reverse engineering, and cybersecurity use cases that can be automated with Python.

By the end of this book, you'll have acquired adequate skills to leverage Python as a helpful tool to pentest and secure infrastructure, while also creating your own custom exploits.

What you will learn

  • Get to grips with Custom vulnerability scanner development
  • Familiarize yourself with web application scanning automation and exploit development
  • Walk through day-to-day cybersecurity scenarios that can be automated with Python
  • Discover enterprise-or organization-specific use cases and threat-hunting automation
  • Understand reverse engineering, fuzzing, buffer overflows , key-logger development, and exploit development for buffer overflows.
  • Understand web scraping in Python and use it for processing web responses
  • Explore Security Operations Centre (SOC) use cases
  • Get to understand Data Science, Python, and cybersecurity all under one hood

Who this book is for

If you are a security consultant , developer or a cyber security enthusiast with little or no knowledge of Python and want in-depth insight into how the pen-testing ecosystem and python combine to create offensive tools , exploits , automate cyber security use-cases and much more then this book is for you. Hands-On Penetration Testing with Python guides you through the advanced uses of Python for cybersecurity and pen-testing, helping you to better understand security loopholes within your infrastructure .

Table of Contents

  1. Introduction to Python
  2. Building Python Scripts
  3. Concept Handling
  4. Advanced Python Modules
  5. Vulnerability Scanner Python - Part 1
  6. Vulnerability Scanner Python - Part 2
  7. Machine Learning and Cyber Security
  8. Automating Web Application Scanning - Part 1
  9. Automated Web Application Scanning - Part 2
  10. Building a Custom Crawler
  11. Reverse-Engineering Linux Applications
  12. Reverse Engineering Windows Applications
  13. Exploit Development
  14. Cyber Threat Intelligence
  15. Other Wonders of Python
  16. Assessments

Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.

À propos de l?auteur

Furqan Khan is a security researcher who loves to innovate in Python, pentesting, ML, AI, and big data ecosystems. With a gold medal at both M.Tech and B.Tech, he started off as a research scientist at NITK, where he developed a web app scanner for the Ministry of IT (India). He then worked as a security researcher with Paladion Networks and Wipro Dubai exploring pentesting/exploitation space where he developed tools such as vulnerability scanner and a threat intelligence platform. Currently, he is working with Du-Telecom Dubai as a pentesting manager. He has published and co-authored white papers and journals with Springer and Elsevier, and has also presented his research and development work at international conferences, including CoCon.

Les informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.

Acheter D'occasion

état :  Comme neuf
Unread book in perfect condition...
Afficher cet article
EUR 43,74

Autre devise

EUR 17,02 expédition depuis Etats-Unis vers France

Destinations, frais et délais

Acheter neuf

Afficher cet article
EUR 42,74

Autre devise

EUR 4,57 expédition depuis Royaume-Uni vers France

Destinations, frais et délais

Résultats de recherche pour Hands-On Penetration Testing with Python: Enhance your...

Image d'archives

Khan, Furqan
Edité par Packt Publishing, 2019
ISBN 10 : 178899082X ISBN 13 : 9781788990820
Neuf Couverture souple

Vendeur : Ria Christie Collections, Uxbridge, Royaume-Uni

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Etat : New. In. N° de réf. du vendeur ria9781788990820_new

Contacter le vendeur

Acheter neuf

EUR 42,74
Autre devise
Frais de port : EUR 4,57
De Royaume-Uni vers France
Destinations, frais et délais

Quantité disponible : Plus de 20 disponibles

Ajouter au panier

Image d'archives

Khan, Furqan,
Edité par Packt Publishing 2019-01, 2019
ISBN 10 : 178899082X ISBN 13 : 9781788990820
Neuf PF

Vendeur : Chiron Media, Wallingford, Royaume-Uni

Évaluation du vendeur 4 sur 5 étoiles Evaluation 4 étoiles, En savoir plus sur les évaluations des vendeurs

PF. Etat : New. N° de réf. du vendeur 6666-IUK-9781788990820

Contacter le vendeur

Acheter neuf

EUR 39,31
Autre devise
Frais de port : EUR 10,86
De Royaume-Uni vers France
Destinations, frais et délais

Quantité disponible : 10 disponible(s)

Ajouter au panier

Image fournie par le vendeur

Khan, Furqan
Edité par Packt Publishing 1/31/2019, 2019
ISBN 10 : 178899082X ISBN 13 : 9781788990820
Neuf Paperback or Softback

Vendeur : BargainBookStores, Grand Rapids, MI, Etats-Unis

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Paperback or Softback. Etat : New. Hands-On Penetration Testing with Python 1.88. Book. N° de réf. du vendeur BBS-9781788990820

Contacter le vendeur

Acheter neuf

EUR 42,67
Autre devise
Frais de port : EUR 10,64
De Etats-Unis vers France
Destinations, frais et délais

Quantité disponible : 5 disponible(s)

Ajouter au panier

Image fournie par le vendeur

Khan, Furqan
Edité par Packt Publishing, 2019
ISBN 10 : 178899082X ISBN 13 : 9781788990820
Neuf Couverture souple

Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Etat : New. N° de réf. du vendeur 35164945-n

Contacter le vendeur

Acheter neuf

EUR 39,63
Autre devise
Frais de port : EUR 17,02
De Etats-Unis vers France
Destinations, frais et délais

Quantité disponible : Plus de 20 disponibles

Ajouter au panier

Image fournie par le vendeur

Furqan Khan
Edité par Packt Publishing Limited, GB, 2019
ISBN 10 : 178899082X ISBN 13 : 9781788990820
Neuf Paperback

Vendeur : Rarewaves.com UK, London, Royaume-Uni

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Paperback. Etat : New. Implement defensive techniques in your ecosystem successfully with PythonKey FeaturesIdentify and expose vulnerabilities in your infrastructure with PythonLearn custom exploit development .Make robust and powerful cybersecurity tools with PythonBook DescriptionWith the current technological and infrastructural shift, penetration testing is no longer a process-oriented activity. Modern-day penetration testing demands lots of automation and innovation; the only language that dominates all its peers is Python. Given the huge number of tools written in Python, and its popularity in the penetration testing space, this language has always been the first choice for penetration testers.Hands-On Penetration Testing with Python walks you through advanced Python programming constructs. Once you are familiar with the core concepts, you'll explore the advanced uses of Python in the domain of penetration testing and optimization. You'll then move on to understanding how Python, data science, and the cybersecurity ecosystem communicate with one another. In the concluding chapters, you'll study exploit development, reverse engineering, and cybersecurity use cases that can be automated with Python.By the end of this book, you'll have acquired adequate skills to leverage Python as a helpful tool to pentest and secure infrastructure, while also creating your own custom exploits.What you will learnGet to grips with Custom vulnerability scanner developmentFamiliarize yourself with web application scanning automation and exploit developmentWalk through day-to-day cybersecurity scenarios that can be automated with PythonDiscover enterprise-or organization-specific use cases and threat-hunting automationUnderstand reverse engineering, fuzzing, buffer overflows , key-logger development, and exploit development for buffer overflows.Understand web scraping in Python and use it for processing web responsesExplore Security Operations Centre (SOC) use casesGet to understand Data Science, Python, and cybersecurity all under one hoodWho this book is forIf you are a security consultant , developer or a cyber security enthusiast with little or no knowledge of Python and want in-depth insight into how the pen-testing ecosystem and python combine to create offensive tools , exploits , automate cyber security use-cases and much more then this book is for you. Hands-On Penetration Testing with Python guides you through the advanced uses of Python for cybersecurity and pen-testing, helping you to better understand security loopholes within your infrastructure . N° de réf. du vendeur LU-9781788990820

Contacter le vendeur

Acheter neuf

EUR 54,98
Autre devise
Frais de port : EUR 2,29
De Royaume-Uni vers France
Destinations, frais et délais

Quantité disponible : Plus de 20 disponibles

Ajouter au panier

Image fournie par le vendeur

Khan, Furqan
Edité par Packt Publishing, 2019
ISBN 10 : 178899082X ISBN 13 : 9781788990820
Neuf Couverture souple

Vendeur : GreatBookPricesUK, Woodford Green, Royaume-Uni

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Etat : New. N° de réf. du vendeur 35164945-n

Contacter le vendeur

Acheter neuf

EUR 40,68
Autre devise
Frais de port : EUR 17,17
De Royaume-Uni vers France
Destinations, frais et délais

Quantité disponible : Plus de 20 disponibles

Ajouter au panier

Image fournie par le vendeur

Khan, Furqan
Edité par Packt Publishing, 2019
ISBN 10 : 178899082X ISBN 13 : 9781788990820
Neuf Couverture souple

Vendeur : moluna, Greven, Allemagne

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Etat : New. This book is a blend of penetration testing and best practices industrial automation in cybersecurity space with Python. This book will enable pentesters to take their skills to the next level by leveraging the power of Python and explaining the core concep. N° de réf. du vendeur 448329734

Contacter le vendeur

Acheter neuf

EUR 48,76
Autre devise
Frais de port : EUR 9,70
De Allemagne vers France
Destinations, frais et délais

Quantité disponible : Plus de 20 disponibles

Ajouter au panier

Image d'archives

Furqan Khan
Edité par Packt Publishing Limited, 2019
ISBN 10 : 178899082X ISBN 13 : 9781788990820
Neuf Paperback / softback
impression à la demande

Vendeur : THE SAINT BOOKSTORE, Southport, Royaume-Uni

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Paperback / softback. Etat : New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days 1062. N° de réf. du vendeur C9781788990820

Contacter le vendeur

Acheter neuf

EUR 48,33
Autre devise
Frais de port : EUR 10,72
De Royaume-Uni vers France
Destinations, frais et délais

Quantité disponible : Plus de 20 disponibles

Ajouter au panier

Image fournie par le vendeur

Khan, Furqan
Edité par Packt Publishing, 2019
ISBN 10 : 178899082X ISBN 13 : 9781788990820
Ancien ou d'occasion Couverture souple

Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Etat : As New. Unread book in perfect condition. N° de réf. du vendeur 35164945

Contacter le vendeur

Acheter D'occasion

EUR 43,74
Autre devise
Frais de port : EUR 17,02
De Etats-Unis vers France
Destinations, frais et délais

Quantité disponible : Plus de 20 disponibles

Ajouter au panier

Image fournie par le vendeur

Furqan Khan
Edité par Packt Publishing Limited, GB, 2019
ISBN 10 : 178899082X ISBN 13 : 9781788990820
Neuf Paperback

Vendeur : Rarewaves.com USA, London, LONDO, Royaume-Uni

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Paperback. Etat : New. Implement defensive techniques in your ecosystem successfully with PythonKey FeaturesIdentify and expose vulnerabilities in your infrastructure with PythonLearn custom exploit development .Make robust and powerful cybersecurity tools with PythonBook DescriptionWith the current technological and infrastructural shift, penetration testing is no longer a process-oriented activity. Modern-day penetration testing demands lots of automation and innovation; the only language that dominates all its peers is Python. Given the huge number of tools written in Python, and its popularity in the penetration testing space, this language has always been the first choice for penetration testers.Hands-On Penetration Testing with Python walks you through advanced Python programming constructs. Once you are familiar with the core concepts, you'll explore the advanced uses of Python in the domain of penetration testing and optimization. You'll then move on to understanding how Python, data science, and the cybersecurity ecosystem communicate with one another. In the concluding chapters, you'll study exploit development, reverse engineering, and cybersecurity use cases that can be automated with Python.By the end of this book, you'll have acquired adequate skills to leverage Python as a helpful tool to pentest and secure infrastructure, while also creating your own custom exploits.What you will learnGet to grips with Custom vulnerability scanner developmentFamiliarize yourself with web application scanning automation and exploit developmentWalk through day-to-day cybersecurity scenarios that can be automated with PythonDiscover enterprise-or organization-specific use cases and threat-hunting automationUnderstand reverse engineering, fuzzing, buffer overflows , key-logger development, and exploit development for buffer overflows.Understand web scraping in Python and use it for processing web responsesExplore Security Operations Centre (SOC) use casesGet to understand Data Science, Python, and cybersecurity all under one hoodWho this book is forIf you are a security consultant , developer or a cyber security enthusiast with little or no knowledge of Python and want in-depth insight into how the pen-testing ecosystem and python combine to create offensive tools , exploits , automate cyber security use-cases and much more then this book is for you. Hands-On Penetration Testing with Python guides you through the advanced uses of Python for cybersecurity and pen-testing, helping you to better understand security loopholes within your infrastructure . N° de réf. du vendeur LU-9781788990820

Contacter le vendeur

Acheter neuf

EUR 59,90
Autre devise
Frais de port : EUR 2,29
De Royaume-Uni vers France
Destinations, frais et délais

Quantité disponible : Plus de 20 disponibles

Ajouter au panier

There are 6 autres exemplaires de ce livre sont disponibles

Afficher tous les résultats pour ce livre