• Complain

Mohit - Python penetration testing essentials: employ the power of Python to get the best out of pentesting

Here you can read online Mohit - Python penetration testing essentials: employ the power of Python to get the best out of pentesting full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. City: Birmingham;UK, year: 2015, publisher: Packt Publishing - ebooks Account, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Mohit Python penetration testing essentials: employ the power of Python to get the best out of pentesting
  • Book:
    Python penetration testing essentials: employ the power of Python to get the best out of pentesting
  • Author:
  • Publisher:
    Packt Publishing - ebooks Account
  • Genre:
  • Year:
    2015
  • City:
    Birmingham;UK
  • Rating:
    3 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 60
    • 1
    • 2
    • 3
    • 4
    • 5

Python penetration testing essentials: employ the power of Python to get the best out of pentesting: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Python penetration testing essentials: employ the power of Python to get the best out of pentesting" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

This book is a practical guide that shows you the advantages of using Python for pentesting with the help of detailed code examples.We start by exploring the basics of networking with Python and then proceed to network hacking. Next, we delve into hacking the application layer where we start with gathering information from a website. We then move on to concepts related to website hacking such as parameter tampering, DDoS, XSS, and SQL injection.By reading this book, you will learn different techniques and methodologies that will familiarize you with the art of pentesting as well as creating automated programs to find the admin console, SQL injection, and XSS attack.

Mohit: author's other books


Who wrote Python penetration testing essentials: employ the power of Python to get the best out of pentesting? Find out the surname, the name of the author of the book and a list of all author's works by series.

Python penetration testing essentials: employ the power of Python to get the best out of pentesting — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Python penetration testing essentials: employ the power of Python to get the best out of pentesting" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Python Penetration Testing Essentials

Python Penetration Testing Essentials

Copyright 2015 Packt Publishing

All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews.

Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the author, nor Packt Publishing, and its dealers and distributors will be held liable for any damages caused or alleged to be caused directly or indirectly by this book.

Packt Publishing has endeavored to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing cannot guarantee the accuracy of this information.

First published: January 2015

Production reference: 1220115

Published by Packt Publishing Ltd.

Livery Place

35 Livery Street

Birmingham B3 2PB, UK.

ISBN 978-1-78439-858-3

www.packtpub.com

Credits

Author

Mohit

Reviewers

Milinda Perera

Rejah Rehim

Ishbir Singh

Commissioning Editor

Sarah Crofton

Acquisition Editor

Sonali Vernekar

Content Development Editor

Merwyn D'souza

Technical Editors

Vivek Arora

Indrajit A. Das

Copy Editors

Karuna Narayanan

Alfida Paiva

Project Coordinator

Neha Bhatnagar

Proofreaders

Ameesha Green

Kevin McGowan

Indexers

Rekha Nair

Tejal Soni

Graphics

Sheetal Aute

Production Coordinator

Shantanu N. Zagade

Cover Work

Shantanu N. Zagade

About the Author

Mohit (also known as Mohit Raj) is an application developer and Python programmer, with a keen interest in the field of information security. He has done his bachelor of technology in computer science from Kurukshetra University, Kurukshetra, and master of engineering (2012) in computer science from Thapar University, Patiala. He has written a thesis as well as a research paper on session hijacking, named COMPARATIVE ANALYSIS OF SESSION HIJACKING ON DIFFERENT OPERATING SYSTEMS , under the guidance of Dr Maninder Singh. He has also done the CCNA and Certified Ethical Hacking course from EC-Council (CEH) and has procured a CEH certification. He has published his article, How to disable or change web-server signature , in the eForensics magazine in December 2013. He has published another article on wireless hacking, named Beware: Its Easy to Launch a Wireless Deauthentication Attack! in Open Source For You in July 2014. He is also a certified Certified Security Analyst (ECSA). He has been working in IBM India for more than 2 years. He is also a freelance professional trainer for CEH and Python in CODEC Networks. Apart from this, he is familiar with Red Hat and CentOS Linux to a great extent, and also has a lot of practical experience of Red Hat. He can be contacted at <>.

First of all, I am grateful to the Almighty for helping me to complete this book. I would like to thank my mother for her love and encouraging support, and my father for raising me in a house with desktops and laptops. A big thanks to my teacher, thesis guide, and hacking trainer, Dr. Maninder Singh, for his immense help. I would like to thank my friend, Bhaskar Das, for providing me with hardware support. I would also like to thank everyone who has contributed to the publication of this book, including the publisher, especially the technical reviewers and also the editors Merwyn D'souza and Sonali Vernekar, for making me laugh at my own mistakes. Last but not least, I'm grateful to my i7 laptop, without which it would not have been possible to write this book.

About the Reviewers

Milinda Perera is a software engineer at Google. He has a passion for designing and implementing solutions for interesting software-engineering challenges. Previously, he also worked as a software engineering intern at Google. He received his PhD, MPhil, MSc, and BSc degrees in computer science from the City University of New York. As a PhD candidate, he has published papers on research areas such as foundations of cryptography, broadcast encryption, steganography, secure cloud storage, and wireless network security.

I would like to thank Alex Perry, my favorite Pythoneer, for being an awesome mentor!

Rejah Rehim is currently a software engineer with Digital Brand Group (DBG), India, and is a long-time advocator of open source. He is a steady contributor to the Mozilla Foundation, and his name has been featured in the San Francisco Monument made by Mozilla Foundation.

He is a part of the Mozilla Add-on Review Board and has contributed to the development of several node modules. He has also been credited with the creation of eight Mozilla Add-ons, including the highly successful Clear Console Add-on, which was selected as one of the best Mozilla add-ons of 2013. With a user base of more than 44,000, it has registered more than 450,000 downloads. He has successfully created the world's first one-of-a-kind security-testing browser bundle, PenQ, which is an open source Linux-based penetration testing browser bundle, preconfigured with tools for spidering, advanced web searching, fingerprinting, and so on.

Rejah is also an active member of the OWASP and the chapter leader of OWASP, Kerala. He is also one of the moderators of the OWASP Google+ group and an active speaker at Coffee@DBG, one of the foremost monthly tech rendezvous in Technopark, Kerala. Having been a part of QBurst in the past and a part of the Cyber Security division of DBG now, Rejah is also a fan of process automation, and has implemented it in DBG.

Ishbir Singh is a freshman studying electrical engineering and computer science at the Georgia Institute of Technology. He's been programming since he was 9 and has built a wide variety of software, from those meant to run on a calculator to those intended for deployment in multiple data centers around the world. Trained as a Microsoft Certified Systems Engineer at the age of 10, he has also dabbled in reverse engineering, information security, hardware programming, and web development. His current interests lie in developing cryptographic peer-to-peer trustless systems, polishing his penetration testing skills, learning new languages (both human and computer), and playing table tennis.

www.PacktPub.com
Support files, eBooks, discount offers, and more

For support files and downloads related to your book, please visit www.PacktPub.com.

Did you know that Packt offers eBook versions of every book published, with PDF and ePub files available? You can upgrade to the eBook version at > for more details.

At www.PacktPub.com, you can also read a collection of free technical articles, sign up for a range of free newsletters and receive exclusive discounts and offers on Packt books and eBooks.

httpswww2packtpubcombookssubscriptionpacktlib Do you need instant - photo 1

https://www2.packtpub.com/books/subscription/packtlib

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Python penetration testing essentials: employ the power of Python to get the best out of pentesting»

Look at similar books to Python penetration testing essentials: employ the power of Python to get the best out of pentesting. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Python penetration testing essentials: employ the power of Python to get the best out of pentesting»

Discussion, reviews of the book Python penetration testing essentials: employ the power of Python to get the best out of pentesting and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.