Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Learn penetration testing with Python 3.x = perform offensive pentesting and prepare red teaming to prevent network attacks and web vulnerabilities /
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Learn penetration testing with Python 3.x / Yehia Elghaly.
Reminder of title:
perform offensive pentesting and prepare red teaming to prevent network attacks and web vulnerabilities /
Author:
Elghaly, Yehia.
Description:
1 online resource (346 pages)
Subject:
COMPUTERS / Certification Guides / CompTIA (incl. A+). -
Online resource:
https://portal.igpublish.com/iglibrary/search/BPB0000537.html
ISBN:
9789390684915
Learn penetration testing with Python 3.x = perform offensive pentesting and prepare red teaming to prevent network attacks and web vulnerabilities /
Elghaly, Yehia.
Learn penetration testing with Python 3.x
perform offensive pentesting and prepare red teaming to prevent network attacks and web vulnerabilities /[electronic resource] :Yehia Elghaly. - 1 online resource (346 pages)
Includes bibliographical references and index.
Learn penetration testing with Python 3.x : perform offensive pentesting and prepare red teaming to prevent network attacks and web vulnerabilities -- About the Author -- About the Reviewers -- Acknowledgement -- Preface -- Table of Contents -- Chapter 1. Start with Penetration Testing and Basic Python -- Chapter 2. Cracking with Python -- Chapter 3. Service and Applications Brute Forcing with Python -- Chapter 4. Python Services Identifications - Ports and Banner -- Chapter 5. Python Network Modules and Nmap -- Chapter 6. Network Monitoring with Python -- Chapter 7. Attacking Wireless with Python -- Chapter 8. Analyze Web Applications with Python -- Chapter 9. Attack Web Application with Python -- Chapter 10. Exploitation Development with Python -- Index.
Access restricted to authorized users and institutions.
This book starts with an understanding of penetration testing and red teaming methodologies and teaches Python 3.x from scratch for those who are not familiar with programming. The book gives the skills of how to create scripts for cracking, and brute force attacks. The second part of this book focuses on the network and wireless level. The book teaches you the skills of how to create an offensive tool using Python 3.x to identify different services and ports using different Python network modules and conducting network attacks. In the network monitoring section, you will be able to monitor layers 3 and 4. And finally, you will be able to conduct different attacks on wireless. The last part of this book focuses on web applications and exploitation developments. It focuses on how to create scripts to extract web information such as links, images, documents, etc. It also focuses on how to create scripts to identify and exploit web vulnerabilities and how to bypass WAF. The last chapter of this book focuses on exploitation development starting with how to play with the stack and then moving on to how to use Python in fuzzing and creating exploitation scripts.
Mode of access: World Wide Web.
ISBN: 9789390684915Subjects--Topical Terms:
1483916
COMPUTERS / Certification Guides / CompTIA (incl. A+).
Index Terms--Genre/Form:
554714
Electronic books.
LC Class. No.: QA76.73
Dewey Class. No.: 005.13
Learn penetration testing with Python 3.x = perform offensive pentesting and prepare red teaming to prevent network attacks and web vulnerabilities /
LDR
:03013nam a2200289 i 4500
001
1157317
006
m eo d
007
cr cn |||m|||a
008
250717s2021 ob 000 0 eng d
020
$a
9789390684915
020
$a
9789390684960
035
$a
BPB0000537
041
0 #
$a
eng
050
0 0
$a
QA76.73
082
0 0
$a
005.13
100
1
$a
Elghaly, Yehia.
$3
1483915
245
1 0
$a
Learn penetration testing with Python 3.x
$b
perform offensive pentesting and prepare red teaming to prevent network attacks and web vulnerabilities /
$c
Yehia Elghaly.
$h
[electronic resource] :
264
1
$a
[Place of publication not identified] :
$b
BPB Publications,
$c
2021.
264
4
$c
©2022
300
$a
1 online resource (346 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
504
$a
Includes bibliographical references and index.
505
0 #
$a
Learn penetration testing with Python 3.x : perform offensive pentesting and prepare red teaming to prevent network attacks and web vulnerabilities -- About the Author -- About the Reviewers -- Acknowledgement -- Preface -- Table of Contents -- Chapter 1. Start with Penetration Testing and Basic Python -- Chapter 2. Cracking with Python -- Chapter 3. Service and Applications Brute Forcing with Python -- Chapter 4. Python Services Identifications - Ports and Banner -- Chapter 5. Python Network Modules and Nmap -- Chapter 6. Network Monitoring with Python -- Chapter 7. Attacking Wireless with Python -- Chapter 8. Analyze Web Applications with Python -- Chapter 9. Attack Web Application with Python -- Chapter 10. Exploitation Development with Python -- Index.
506
#
$a
Access restricted to authorized users and institutions.
520
3
$a
This book starts with an understanding of penetration testing and red teaming methodologies and teaches Python 3.x from scratch for those who are not familiar with programming. The book gives the skills of how to create scripts for cracking, and brute force attacks. The second part of this book focuses on the network and wireless level. The book teaches you the skills of how to create an offensive tool using Python 3.x to identify different services and ports using different Python network modules and conducting network attacks. In the network monitoring section, you will be able to monitor layers 3 and 4. And finally, you will be able to conduct different attacks on wireless. The last part of this book focuses on web applications and exploitation developments. It focuses on how to create scripts to extract web information such as links, images, documents, etc. It also focuses on how to create scripts to identify and exploit web vulnerabilities and how to bypass WAF. The last chapter of this book focuses on exploitation development starting with how to play with the stack and then moving on to how to use Python in fuzzing and creating exploitation scripts.
538
$a
Mode of access: World Wide Web.
650
# 7
$a
COMPUTERS / Certification Guides / CompTIA (incl. A+).
$2
bisacsh
$3
1483916
650
# 7
$a
COMPUTERS / Security / General.
$2
bisacsh
$3
1483863
650
# 7
$a
COMPUTERS / Programming / General.
$2
bisacsh
$3
1483886
650
# 7
$a
COMPUTERS / Operating Systems / Linux.
$2
bisacsh
$3
1483840
650
# 7
$a
COMPUTERS / Operating Systems / Windows Server.
$2
bisacsh
$3
1483896
650
# 7
$a
COMPUTERS / Networking / Network Protocols.
$2
bisacsh
$3
1483839
655
# 4
$a
Electronic books.
$2
local
$3
554714
856
4 0
$u
https://portal.igpublish.com/iglibrary/search/BPB0000537.html
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login