eBooks-it.org Logo
eBooks-IT.org Inner Image

Python Penetration Testing Essentials


eBooks-IT.org User Icon Image Uploaded by Enigma69
Python Penetration Testing Essentials Image

Book Details:

Publisher:Packt Publishing
Series: Packt , Essentials
Author:Raj Mohit
Edition:1
ISBN-10:1784398586
ISBN-13:9781784398583
Pages:178
Published:Jan 28 2015
Posted:Nov 19 2014
Language:English
Book format:PDF
Book size:3.19 MB

Book Description:

If you are a Python programmer or a security researcher who has basic knowledge of Python programming and want to learn about penetration testing with the help of Python, this book is ideal for you. Even if you are new to the field of ethical hacking, this book can help you find the vulnerabilities in your system so that you are ready to tackle any kind of attack or intrusion.

Download Link:

Related Books:

The Basics of Hacking and Penetration Testing

Ethical Hacking and Penetration Testing Made Easy
The Basics of Hacking and Penetration Testing Image
2nd Edition
The Basics of Hacking and Penetration Testing, 2nd Ed. serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. No prior hacking experience is needed. You will learn how to properly utilize and interpret the results of modern day hacking tools, which are required to complete a penetration test. Tool coverage includes Backtrack and Kali Linux, Google reconnaissance, MetaGooFil, DNS interrogation, Nmap, Nessus, Metasploit, the Social Engineer Toolkit (SET) , w3af, Netcat, post exploitation tactics, the Hacker Defender rootkit, and more. The book provides a simple and clean explanatio...

Penetration Testing and Network Defense

Penetration Testing and Network Defense Image
The practical guide to simulating, detecting, and responding to network attacks Create step-by-step testing plans Learn to perform social engineering and host reconnaissance Evaluate session hijacking methods Exploit web server vulnerabilities Detect attempts to breach database security Use password crackers to obtain access information Circumvent Intrusion Prevention Systems (IPS) and firewall protections and disrupt the service of routers and switches Scan and penetrate wireless networks Understand the inner workings of Trojan Horses, viruses, and other backdoor applications Test UNIX, Microsoft, and Novell servers for vulnerabilities Learn the root cause of buffer overflows and how to prevent them Perform and prevent Denial of Service attacks Pe...

Ninja Hacking

Unconventional Penetration Testing Tactics and Techniques
Ninja Hacking Image
Ever thought of using the time-tested tactics and techniques ofthe ancientninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen testing methods out the window for now and see how thinking and acting like a ninja can actually grant you quicker and more complete access to a company's assets. Get in before the hacker does with these unorthodox techniques. Use all of the tools that the ninja has: disguise, espionage, stealth, and concealment. Learn how to benefit from these tools by laying your plans, impersonating employees, infiltrating via alarm system evasi...



2007 - 2021 © eBooks-IT.org