• Complain

Khan - Hands-on penetration testing with Python enhance your ethical hacking skills to build automated and intelligent systems

Here you can read online Khan - Hands-on penetration testing with Python enhance your ethical hacking skills to build automated and intelligent systems full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. City: Birmingham;UK, year: 2019, publisher: Packt Publishing, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover
  • Book:
    Hands-on penetration testing with Python enhance your ethical hacking skills to build automated and intelligent systems
  • Author:
  • Publisher:
    Packt Publishing
  • Genre:
  • Year:
    2019
  • City:
    Birmingham;UK
  • Rating:
    3 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 60
    • 1
    • 2
    • 3
    • 4
    • 5

Hands-on penetration testing with Python enhance your ethical hacking skills to build automated and intelligent systems: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Hands-on penetration testing with Python enhance your ethical hacking skills to build automated and intelligent systems" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

A practical guide to implementing defensive techniques in your ecosystem successfully with the help of PythonKey Features Identify and expose vulnerabilities in your infrastructure with Python Bypass Cloud environments, Wi-Fi network, Bluetooth devices and fetch sensitive data with simple Python programs. Make robust and powerful cybersecurity tools with python Book DescriptionWith the current technological and infrastructural shift, penetration testing is no longer a process-oriented activity. Modern-day penetration testing demands lots of automation and innovation, and the only language which dominates all its peers in the penetration testing domain is Python. Given the huge number of tools written in Python and its popularity in the penetration testing space, this language has always been the first choice for penetration testers.Hands-On Penetration Testing with Python walks you through the advanced Python programming constructs. Once you are familiar with the core concepts, youll explore the advanced use of Python in the domain of penetration testing and optimization. Youll then move on to understanding how Python, data science, and the cybersecurity ecosystem communicate with one another. In addition to this, youll study development, reverse engineering, and encountered cybersecurity use cases that can be automated with Python.By the end of this book, youll have discovered how to leverage Python as a helpful tool to pentest and secure infrastructure, whilst also creating your own custom exploits.What you will learn Study penetration testing automation Explore Security Operations Centre (SOC) use cases and cloud security Discover enterprise- or organization-specific use cases and threat hunting automation Understand reverse engineering, fuzzing, and exploit development Walk through day-to-day scenarios of cybersecurity that can be automated with Python Comprehend data science, Python, and cyber security all under one hood Who This Book Is ForHands-On Penetration Testing with Python is for you if you are a developer with prior knowledge of Python, and want in-depth insight into the pentesting ecosystem. This book guides you through the advanced use of Python for cybersecurity and pentesting, helping you to better understand security loopholes within your infrastructure and cloud environments.

Khan: author's other books


Who wrote Hands-on penetration testing with Python enhance your ethical hacking skills to build automated and intelligent systems? Find out the surname, the name of the author of the book and a list of all author's works by series.

Hands-on penetration testing with Python enhance your ethical hacking skills to build automated and intelligent systems — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Hands-on penetration testing with Python enhance your ethical hacking skills to build automated and intelligent systems" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Hands-On Penetration Testing with Python Enhance your ethical hacking skills - photo 1
Hands-On Penetration Testing with Python
Enhance your ethical hacking skills to build automated and intelligent systems
Furqan Khan

BIRMINGHAM - MUMBAI Hands-On Penetration Testing with Python Copyright 2019 - photo 2

BIRMINGHAM - MUMBAI
Hands-On Penetration Testing with Python

Copyright 2019 Packt Publishing

All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews.

Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the author, nor Packt Publishing or its dealers and distributors, will be held liable for any damages caused or alleged to have been caused directly or indirectly by this book.

Packt Publishing has endeavored to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing cannot guarantee the accuracy of this information.

Commissioning Editor: Vijin Boricha
Acquisition Editor: Shrilekha Inani
Content Development Editor: Nithin George Varghese
Technical Editor: Mohit Hassija
Copy Editor: Safis Editing
Language Support Editor: Mary McGowan
Project Coordinator: Drashti Panchal
Proofreader: Safis Editing
Indexer: Pratik Shirodkar
Graphics: Tom Scaria
Production Coordinator: Jisha Chirayil

First published: January 2019

Production reference: 1310119

Published by Packt Publishing Ltd.
Livery Place
35 Livery Street
Birmingham
B3 2PB, UK.

ISBN 978-1-78899-082-0

www.packtpub.com


This book is dedicated to my lovely parents!
maptio Mapt is an online digital library that gives you full access to over - photo 3
mapt.io

Mapt is an online digital library that gives you full access to over 5,000 books and videos, as well as industry leading tools to help you plan your personal development and advance your career. For more information, please visit our website.

Why subscribe?
  • Spend less time learning and more time coding with practical eBooks and Videos from over 4,000 industry professionals

  • Improve your learning with Skill Plans built especially for you

  • Get a free eBook or video every month

  • Mapt is fully searchable

  • Copy and paste, print, and bookmark content

Packt.com

Did you know that Packt offers eBook versions of every book published, with PDF and ePub files available? You can upgrade to the eBook version at www.packt.com and as a print book customer, you are entitled to a discount on the eBook copy. Get in touch with us at customercare@packtpub.com for more details.

At www.packt.com , you can also read a collection of free technical articles, sign up for a range of free newsletters, and receive exclusive discounts and offers on Packt books and eBooks.

Contributors
About the author

Furqan Khan is a security researcher who loves to innovate in Python, pentesting, ML, AI, and big data ecosystems.

With a gold medal at both M.Tech and B.Tech, he started off as a research scientist at NITK, where he developed a web app scanner for the Ministry of IT (India). He then worked as a security researcher with Paladion Networks and Wipro Dubai exploring pentesting/exploitation space where he developed tools such as vulnerability scanner and a threat intelligence platform.

Currently, he is working with Du-Telecom Dubai as a pentesting manager. He has published and co-authored white papers and journals with Springer and Elsevier, and has also presented his research and development work at international conferences, including CoCon.

There is a well-known saying that goes like this: "You are the average of the five people you spend the most time with." I have the following improvisation to it: " Allmighty Allah has created you uniquely with the ability to be yourself and yet acquire wisdom from all the brilliant people around you."

This book would never have been possible without the love and support of my amazing father, Mr Shakeel Ahmed Khan, my beautiful mother, Mrs Night Khan, my fantastic brother, Burhan Khan, and my wonderful partner in crime, Zakiya Khan.

I would also like to extend my gratitude to those people who have been the catalyst for whatever little I have been able to achieve: Mr Walid Kamal, Mrs Santhi Thilagam, Mr Sayed Wajahat Ali, Mr Gobind Basmall, Mr Siddharth Anbalahan, Mrs Mehmooda Jan, and Mr Hassan Magray. I am grateful to all of you for believing in me.
About the reviewer

Phil Bramwell acquired the Certified Ethical Hacker and Certified Expert Penetration Tester certifications at the age of 21. His professional experience includes common criteria design reviews and testing, network security consulting, penetration testing, and PCI-DSS compliance auditing for banks, universities, and governments. He later acquired the CISSP and Metasploit Pro Certified Specialist credentials. Today, he is a cyber security and cryptocurrency consultant and works in the automotive industry, specializing in malware detection and analysis.

Packt is searching for authors like you

If you're interested in becoming an author for Packt, please visit authors.packtpub.com and apply today. We have worked with thousands of developers and tech professionals, just like you, to help them share their insight with the global tech community. You can make a general application, apply for a specific hot topic that we are recruiting an author for, or submit your own idea.

Preface

With so many amazing books out there in the cyber security and Python programming space, written by brilliant people, what does this book have to offer that's different? It's a very valid question, so now let's try to answer this.

This book makes a humble attempt to capture the practical and hands-on experience I have acquired working with Python and the penetration testing space over the past few years. It is a unique amalgamation of Python, penetration testing/offensive security, defensive security, and machine learning use cases in the pentesting ecosystem. The book starts off gently, covering all the key concepts of Python, enabling the reader to acquire a very decent grasp of Python by the end of the first four chapters, before then clicking into gear and delving into the hard core automation of penetration testing and cyber security use cases. Readers will find out how to develop industry standard vulnerability scanners from scratch, identical to Nessus and Qualys. The book then explores concepts concerning web application vulnerabilities, their exploitation, and automating web exploitation with custom tailored exploits. It also affords very deep insights into reverse engineering, fuzzing, and buffer overflow vulnerabilities in both Windows and Linux environments, utilizing Python as a centerpiece. There is a section dedicated to custom exploit development, with a focus on evading anti-virus detection. The book also has a chapter dedicated to developing a web crawler and its utilization in the cyber security space. The book also gives decent insights on defensive security concepts, talking about cyber threat intelligence, and how a custom threat scoring algorithm can be developed. The book concludes with many other beneficial use cases of Python, such as developing a custom keylogger.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Hands-on penetration testing with Python enhance your ethical hacking skills to build automated and intelligent systems»

Look at similar books to Hands-on penetration testing with Python enhance your ethical hacking skills to build automated and intelligent systems. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Hands-on penetration testing with Python enhance your ethical hacking skills to build automated and intelligent systems»

Discussion, reviews of the book Hands-on penetration testing with Python enhance your ethical hacking skills to build automated and intelligent systems and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.