Treffer: Python: Penetration Testing for Developers
Weitere Informationen
About This BookSharpen your pentesting skills with PythonDevelop your fluency with Python to write sharper scripts for rigorous security testingGet stuck into some of the most powerful tools in the security worldWho This Book Is ForIf you are a Python programmer or a security researcher who has basic knowledge of Python programming and wants to learn about penetration testing with the help of Python, this course is ideal for you. Even if you are new to the field of ethical hacking, this course can help you find the vulnerabilities in your system so that you are ready to tackle any kind of attack or intrusion.What You Will LearnFamiliarize yourself with the generation of Metasploit resource files and use the Metasploit Remote Procedure Call to automate exploit generation and executionExploit Remote File Inclusion to gain administrative access to systems with Python and other scripting languagesCrack an organization's internet perimeter and chain exploits to gain deeper access to an organization's resourcesExplore wireless traffic with the help of various programs and perform wireless attacks with Python programsGather passive information from a website using automated scripts and perform XSS, SQL injection, and parameter tampering attacksDevelop complicated header-based attacks with PythonIn DetailCybercriminals are always one step ahead when it comes to tools and techniques. This means you need to use the same tools and adopt the same mindset to properly secure your software. This course shows you how to do just that, demonstrating how effective Python can be for powerful. Consisting of three key modules, work through each to take your Python and security skills to the next level.In the first module, you'll quickly find out how to tackle some of the common challenges facing pentesters, using custom Python tools designed specifically for your needs. You'll also learn what tools to use and when, giving you complete confidence when deploying your pentesting tools to combat any potential threat.In the next module, you'll begin hacking into the application layer. Covering everything from parameter tampering and DDoS, to SQL injection, it will build on the knowledge and skills you acquired in the first module to make you an even more fluent security expert.Finally, in the third module, you'll find more than 60 Python pentesting recipes. This will soon become your trusted resource for any pentesting situation.