Home » Programming » Learning Penetration Testing with Python

Learning Penetration Testing with Python

Learning Penetration Testing with Python

  • Author : Christopher Duffy
  • Year : 2015
  • Pages : 314
  • File size : 9.37 MB
  • File format : PDF
  • Category : Programming, Python

Book Description:

Python is a powerful new-age scripting platform that allows you to build exploits, evaluate services, automate, and link solutions with ease. Python is a multi-paradigm programming language well suited to both object-oriented application development as well as functional design patterns. Because of the power and flexibility offered by it, Python has become one of the most popular languages used for penetration testing.

This book highlights how you can evaluate an organization methodically and realistically. Specific tradecraft and techniques are covered that show you exactly when and where industry tools can and should be used and when Python fits a need that proprietary and open source solutions do not.

Initial methodology, and Python fundamentals are established and then built on. Specific examples are created with vulnerable system images, which are available to the community to test scripts, techniques, and exploits. This book walks you through real-world penetration testing challenges and how Python can help.

From start to finish, the book takes you through how to create Python scripts that meet relative needs that can be adapted to particular situations. As chapters progress, the script examples explain new concepts to enhance your foundational knowledge, culminating with you being able to build multi-threaded security tools, link security tools together, automate reports, create custom exploits, and expand Metasploit modules.

What You Will Learn

  • Familiarise yourself with the generation of Metasploit resource files
  • Use the Metasploit Remote Procedure Call (MSFRPC) to automate exploit generation and execution
  • Use Python’s Scrapy, network, socket, office, Nmap libraries, and custom modules
  • Parse Microsoft Office spreadsheets and eXtensible Markup Language (XML) data files
  • Write buffer overflows and reverse Metasploit modules to expand capabilities
  • Exploit Remote File Inclusion (RFI) to gain administrative access to systems with Python and other scripting languages
  • Crack an organization’s Internet perimeter
  • Chain exploits to gain deeper access to an organization’s resources
  • Interact with web services with Python

Download eBook


eBooks in the same categorie :

3ds Max Speed Modeling for 3D Artists

Download free 3ds Max Speed Modeling for 3D Artists eBook in PDF

Production of 3D art is an exciting medium, but the task of modeling requires intense attention to detail, so speed and efficiency are vital. This boo

Mastering JavaFX 8 Controls

Download free Mastering JavaFX 8 Controls eBook in PDF

Design and Deploy High-Performance JavaFX Controls Deliver state-of-the-art applications with visually stunning UIs. Mastering JavaFX 8 Controls pro

iWork 09 For Dummies

Download free iWork 09 For Dummies eBook in PDF

Dress up office documents the Apple way with iWork ’09 and this friendly guide If you’re a Mac lover and want to explore life outside of t

Python Data Science Handbook

Download free Python Data Science Handbook eBook in PDF

For many researchers, Python is a first-class tool mainly because of its libraries for storing, manipulating, and gaining insight from data. Several r

Python Game Programming By Example

Download free Python Game Programming By Example eBook in PDF

With a growing interest in learning to program, game development is an appealing topic for getting started with coding. From geometry to basic Artific