본문 바로가기

리디 접속이 원활하지 않습니다.
강제 새로 고침(Ctrl + F5)이나 브라우저 캐시 삭제를 진행해주세요.
계속해서 문제가 발생한다면 리디 접속 테스트를 통해 원인을 파악하고 대응 방법을 안내드리겠습니다.
테스트 페이지로 이동하기

Hands-On Penetration Testing with Python 상세페이지

Hands-On Penetration Testing with Python

Enhance your ethical hacking skills to build automated and intelligent systems

  • 관심 0
소장
전자책 정가
22,000원
판매가
22,000원
출간 정보
  • 2019.01.31 전자책 출간
듣기 기능
TTS(듣기) 지원
파일 정보
  • PDF
  • 492 쪽
  • 39.7MB
지원 환경
  • PC뷰어
  • PAPER
ISBN
9781788999465
ECN
-
Hands-On Penetration Testing with Python

작품 정보

▶Book Description
With the current technological and infrastructural shift, penetration testing is no longer a process-oriented activity. Modern-day penetration testing demands lots of automation and innovation; the only language that dominates all its peers is Python. Given the huge number of tools written in Python, and its popularity in the penetration testing space, this language has always been the first choice for penetration testers.

Hands-On Penetration Testing with Python walks you through advanced Python programming constructs. Once you are familiar with the core concepts, you’ll explore the advanced uses of Python in the domain of penetration testing and optimization. You’ll then move on to understanding how Python, data science, and the cybersecurity ecosystem communicate with one another. In the concluding chapters, you’ll study exploit development, reverse engineering, and cybersecurity use cases that can be automated with Python.

By the end of this book, you’ll have acquired adequate skills to leverage Python as a helpful tool to pentest and secure infrastructure, while also creating your own custom exploits.

▶What You Will Learn
⦁ Get to grips with Custom vulnerability scanner development
⦁ Familiarize yourself with web application scanning automation and exploit development
⦁ Walk through day-to-day cybersecurity scenarios that can be automated with Python
⦁ Discover enterprise-or organization-specific use cases and threat-hunting automation
⦁ Understand reverse engineering, fuzzing, buffer overflows , key-logger development, and exploit development for buffer overflows.
⦁ Understand web scraping in Python and use it for processing web responses
⦁ Explore Security Operations Centre (SOC) use cases
⦁ Get to understand Data Science, Python, and cybersecurity all under one hood

▶Key Features
⦁ Identify and expose vulnerabilities in your infrastructure with Python
⦁ Learn custom exploit development .
⦁ Make robust and powerful cybersecurity tools with Python

▶Who This Book Is For
If you are a security consultant , developer or a cyber security enthusiast with little or no knowledge of Python and want in-depth insight into how the pen-testing ecosystem and python combine to create offensive tools , exploits , automate cyber security use-cases and much more then this book is for you. Hands-On Penetration Testing with Python guides you through the advanced uses of Python for cybersecurity and pen-testing, helping you to better understand security loopholes within your infrastructure.

▶What this book covers
⦁ Chapter 1, Introduction to Python, covers the basics of Python, focusing primarily on data types, variables, expressions, and program structures utilized by Python. The objective is to familiarize the reader with the basics of the Python programming language with a view to using and leveraging it in forthcoming chapters.

⦁ Chapter 2, Building Python Scripts, covers further concepts of Python that form the basis for writing a Python script, while also exploring concepts such as functions, modules, loops, packages, and imports.

⦁ Chapter 3, Concept Handling, introduces the reader to other Python-related concepts, including classes, objects, IO and directory access, regular expressions, exception handling, and the parsing of CSV, JSON, and XML files.

⦁ Chapter 4, Advanced Python Modules, takes the learning process to an advanced level and explores the power of Python to understand multiprocessing and multithreading concepts, along with socket programming.

⦁ Chapter 5, Vulnerability Scanner Python - Part 1, explores the advanced concepts that are required in order to make a mini vulnerability scanning engine, which would take the port scanning results from a custom port scanner build over Nmap and apply various open source scripts and Metasploit modules, along with Python, Ruby, and NSE scripts. The results would be aggregated and finally, a report would be drafted for analysts to analyze. This chapter is very big in terms of complexity and lines of code and is split into two pars. This part focuses on the automation of port scanning with Python.

⦁ Chapter 6, Vulnerability Scanner Python - Part 2, explores the advanced concepts that are required in order to make a mini vulnerability scanning engine. This chapter is a continuation of the previous chapter, with the reader learning how to orchestrate a variety of Kali Linux tools to work together in order to automate the service enumeration phase of the vulnerability assessment, thereby completing the development of the custom vulnerability scanner.

⦁ Chapter 7, Machine Learning and Cybersecurity, tries to connect the cyber security space with data science and shed some light as to how we can use machine learning and natural language processing to automate the manual report analysis phase of penetration testing. This chapter will also glue all the previous parts together to make a mini penetration testing toolkit based on the learning we have acquired hitherto.

⦁ Chapter 8, Automating Web Application Scanning - Part 1, explains to readers how they can use Python to automate various web application attack categories, with some of the most well known being SQL injection, XSS, CSRF, and clickjacking.

⦁ Chapter 9, Automated Web Application Scanning - Part 2, is a continuation of the previous chapter. Here, the reader is going to understand how they can use Python to develop custom exploits that will exploit the web application and end up giving shell access to a user using Python.

⦁ Chapter 10, Building a Custom Crawler, explains how to build a custom crawler coded in Python in order to crawl through the application, with and without authentication, while listing out injection points and web pages of the application under testing. The capabilities of the crawler can be extended and tailored as per requirements.

⦁ Chapter 11, Reverse Engineering Linux Applications and Buffer Overflows, explains how to perform reverse engineering with Linux applications. The reader is also going to understand how Python can be used in aiding buffer overflow vulnerabilities in the Linux environment. The chapter also guides readers on custom exploit development, targeting buffer overflow vulnerabilities.

⦁ Chapter 12, Reverse Engineering Windows Applications, explains how to perform reverse engineering with Windows applications and how Python can be used in aiding buffer overflow vulnerabilities in the Windows environment. The chapter also guides readers on custom exploit development, targeting buffer overflow vulnerabilities.

⦁ Chapter 13, Exploit Development, explains how readers can create their own exploits written in Python, exploits that can be extended as Metasploit modules, and also covers the encoding of shells to avoid detection.

⦁ Chapter 14, Cyber Threat Intelligence, guides readers on how to use Python for cyber threat intelligence and the gathering of threat feeds, threat scoring, and finally, how to utilize the information obtained such that the SIEMs, IPS, and IDS systems are powered by the latest threat information to aid in early detection.

⦁ Chapter 15, Other Wonders of Python, covers how to use Python for extracting Google browser-saved passwords, developing a custom keylogger, parsing Nessus and Nmap report files, and more.

작가 소개

⦁ Furqan Khan
Furqan Khan is a cybersecurity and automation enthusiast who loves to innovate in the domain of cybersecurity with the objective of exploring new age technologies like AI, ML, analytics, and amalgamating the same with cybersecurity to attain high-quality products with maximum automation and throughput.

Complementing his academic excellence with a gold medal at both master's and bachelor's degree in Engineering and full academic scholarship, Furqan has had a very rewarding industrial experience right from inception. Furqan has worked as a Research Scientist at National Institute of technology Karnataka where he developed a tool for Ministry of IT and Telecommunications for detection of Injection vulnerabilities, state violation attacks and parameter pollution in web applications.

Carrying forward his cybersecurity research and automation experience Furqan next took a role as a Senior Security researcher at Paladion Networks where he developed a vulnerability scanner which goes by the name Penetration Testing Orchestrator, a free version of which can be found on Git-hub. The tool explored the power of AI and Machine learning to automate the entire penetration testing process, thereby reducing the organizational cost by a significant factor.

Currently, Furqan is working with Wipro Dubai and has developed a Cyber Threat Intelligence platform, that automates the cyber intelligence process. The tool is highly customizable with tons of add-on features like phishing detection, social media intelligence etc. As a part of a roadmap, Furqan is actively working on more features and enhancement of the platform.

Furqan has published and co-authored high-class cyber security white papers & Journals with leading publications like Springer & Elsevier. Furqan has also presented his tool (PTO) at international conferences like CoCon as a keynote speaker and has many acclaims to his name on innovating with a blend of Python, ML, AI, Cybersecurity and Penetration Testing.

리뷰

0.0

구매자 별점
0명 평가

이 작품을 평가해 주세요!

건전한 리뷰 정착 및 양질의 리뷰를 위해 아래 해당하는 리뷰는 비공개 조치될 수 있음을 안내드립니다.
  1. 타인에게 불쾌감을 주는 욕설
  2. 비속어나 타인을 비방하는 내용
  3. 특정 종교, 민족, 계층을 비방하는 내용
  4. 해당 작품의 줄거리나 리디 서비스 이용과 관련이 없는 내용
  5. 의미를 알 수 없는 내용
  6. 광고 및 반복적인 글을 게시하여 서비스 품질을 떨어트리는 내용
  7. 저작권상 문제의 소지가 있는 내용
  8. 다른 리뷰에 대한 반박이나 논쟁을 유발하는 내용
* 결말을 예상할 수 있는 리뷰는 자제하여 주시기 바랍니다.
이 외에도 건전한 리뷰 문화 형성을 위한 운영 목적과 취지에 맞지 않는 내용은 담당자에 의해 리뷰가 비공개 처리가 될 수 있습니다.
아직 등록된 리뷰가 없습니다.
첫 번째 리뷰를 남겨주세요!
'구매자' 표시는 유료 작품 결제 후 다운로드하거나 리디셀렉트 작품을 다운로드 한 경우에만 표시됩니다.
무료 작품 (프로모션 등으로 무료로 전환된 작품 포함)
'구매자'로 표시되지 않습니다.
시리즈 내 무료 작품
'구매자'로 표시되지 않습니다. 하지만 같은 시리즈의 유료 작품을 결제한 뒤 리뷰를 수정하거나 재등록하면 '구매자'로 표시됩니다.
영구 삭제
작품을 영구 삭제해도 '구매자' 표시는 남아있습니다.
결제 취소
'구매자' 표시가 자동으로 사라집니다.

개발/프로그래밍 베스트더보기

  • 핸즈온 LLM (제이 알아마르, 마르턴 흐루턴도르스트)
  • 조코딩의 AI 비트코인 자동 매매 시스템 만들기 (조동근)
  • 모던 소프트웨어 엔지니어링 (데이비드 팔리, 박재호)
  • 요즘 우아한 AI 개발 (우아한형제들)
  • 주니어 백엔드 개발자가 반드시 알아야 할 실무 지식 (최범균)
  • 개정판 | 혼자 공부하는 머신러닝+딥러닝 (박해선)
  • 개정4판 | 스위프트 프로그래밍 (야곰)
  • 웹 접근성 바이블 (이하라 리키야, 고바야시 다이스케)
  • Do it! LLM을 활용한 AI 에이전트 개발 입문 (이성용)
  • 혼자 공부하는 네트워크 (강민철)
  • 컴퓨터 밑바닥의 비밀 (루 샤오펑, 김진호)
  • 7가지 프로젝트로 배우는 LLM AI 에이전트 개발 (황자, 김진호)
  • 러닝 랭체인 (메이오 오신, 누노 캄포스)
  • LLM 엔지니어링 (막심 라본, 폴 이우수틴)
  • 멀티패러다임 프로그래밍 (유인동)
  • LLM 서비스 설계와 최적화 (슈레야스 수브라마니암, 김현준)
  • 이펙티브 소프트웨어 설계 (토마스 레렉, 존 스키트)
  • 테스트 너머의 QA 엔지니어링 (김명관)
  • 혼자 공부하는 컴퓨터 구조+운영체제 (강민철)
  • 기획자로 산다는 것 (카카)

본문 끝 최상단으로 돌아가기

spinner
앱으로 연결해서 다운로드하시겠습니까?
닫기 버튼
대여한 작품은 다운로드 시점부터 대여가 시작됩니다.
앱으로 연결해서 보시겠습니까?
닫기 버튼
앱이 설치되어 있지 않으면 앱 다운로드로 자동 연결됩니다.
모바일 버전