Close
Enter your search into one or more of the boxes below:
You can refine your search by selecting from any of the options below:
Search
Learning Penetration Testing with Python

Learning Penetration Testing with Python (Paperback)

£31.99
To Order. Estimated despatch in 1-3 weeks.
Email me when back in stock

Synopsis

Utilize Python scripting to execute effective and efficient penetration tests About This Book * Understand how and where Python scripts meet the need for penetration testing * Familiarise yourself with the process of highlighting a specific methodology to exploit an environment to fetch critical data * Develop your Python and penetration testing skills with real-world examples Who This Book Is For If you are a security professional or researcher, with knowledge of different operating systems and a conceptual idea of penetration testing, and you would like to grow your knowledge in Python, then this book is ideal for you.

What You Will Learn * Familiarise yourself with the generation of Metasploit resource files * Use the Metasploit Remote Procedure Call (MSFRPC) to automate exploit generation and execution * Use Python's Scrapy, network, socket, office, Nmap libraries, and custom modules * Parse Microsoft Office spreadsheets and eXtensible Markup Language (XML) data files * Write buffer overflows and reverse Metasploit modules to expand capabilities * Exploit Remote File Inclusion (RFI) to gain administrative access to systems with Python and other scripting languages * Crack an organization's Internet perimeter * Chain exploits to gain deeper access to an organization's resources * Interact with web services with Python In Detail Python is a powerful new-age scripting platform that allows you to build exploits, evaluate services, automate, and link solutions with ease. Python is a multi-paradigm programming language well suited to both object-oriented application development as well as functional design patterns. Because of the power and flexibility offered by it, Python has become one of the most popular languages used for penetration testing.

This book highlights how you can evaluate an organization methodically and realistically. Specific tradecraft and techniques are covered that show you exactly when and where industry tools can and should be used and when Python fits a need that proprietary and open source solutions do not. Initial methodology, and Python fundamentals are established and then built on. Specific examples are created with vulnerable system images, which are available to the community to test scripts, techniques, and exploits. This book walks you through real-world penetration testing challenges and how Python can help. From start to finish, the book takes you through how to create Python scripts that meet relative needs that can be adapted to particular situations. As chapters progress, the script examples explain new concepts to enhance your foundational knowledge, culminating with you being able to build multi-threaded security tools, link security tools together, automate reports, create custom exploits, and expand Metasploit modules. Style and approach This book is a practical guide that will help you become better penetration testers and/or Python security tool developers.

Each chapter builds on concepts and tradecraft using detailed examples in test environments that you can simulate.

Computing & ITComputer networking & communicationsNetwork securityComputing & ITComputer security Publisher: Packt Publishing Limited Publication Date: 30/09/2015 ISBN-13: 9781785282324  Details: Type: Paperback Format: Books
Availability: To Order. Estimated despatch in 1-3 weeks.  

Christopher Duffy currently leads cybersecurity and penetration testing engagements globally. He has a specialization in advanced technical testing, including penetration testing and security assessment done to evaluate an organization's security strategy from a malicious actor's perspective. He has worked a lot with both network and system engineering teams to evaluate critical system data flows, and identified areas where controls can be put in place to prevent a breach of sensitive or critical data. His work with multiple organizations has been key to protecting resources based on the information they have held, which has helped reduce risks while maintaining resilient and cost-effective security postures. Chris has over 12 years of experience in the information technology and security areas, including security consultation, with a focus on business risk. He has helped build advanced attack and penetration teams. The work that his teams have done has encompassed everything from threat modeling and penetration tests to firewall reviews and FedRAMP readiness assessments. Chris has led, managed, and executed over 400 engagements for Fortune 500 companies, U.S. government entities, medical providers and payers, educational institutes, financial services, research organizations, and cloud providers. For almost a decade prior to private sector work, Chris was a cyber warfare specialist, senior systems engineer, and network infrastructure supervisor for the United States Air Force (USAF). He has been honored with numerous technical and leadership awards. Some of these include the (ISC)2 Information Security Leadership Award (ISLA) for the information security practitioner category in 2013, the noncommissioned officer of the year (both at the base and wing levels) in 2011, and the top technician within the cyber transport career field for the United States Air Force (USAF) Intelligence Surveillance and Reconnaissance Agency. He is a distinguished graduate of USAF network warfare training and has publications to his credit in SANS Reading Room, Hackin9 magazine, eForensics magazine and PenTest magazine. He holds 23 certifications, a degree in computer science, and a master's degree in information security and assurance.

More books by Christopher Duffy

Leave Review

Delivery

Delivery Options

All delivery times quoted are the average, and cannot be guaranteed. These should be added to the availability message time, to determine when the goods will arrive. During checkout we will give you a cumulative estimated date for delivery.

Location 1st Book Each additional book Average Delivery Time
UK Second Class Available free for ALL orders. No charge for each additional book. 3-7 Days
UK First Class £4.50 £1.00 1-2 Days
UK Courier £7.00 £1.00 1-2 Days
Western Europe** Courier £17.00 £3.00 2-3 Days
Western Europe** Airmail £5.00 £1.50 4-14 Days
USA / Canada Courier £20.00 £3.00 2-4 Days
USA / Canada Airmail £7.00 £3.00 4-14 Days
Rest of World Courier £22.50 £3.00 3-6 Days
Rest of World Airmail £8.00 £3.00 7-21 Days

** Includes Austria, Belgium, Denmark, France, Germany, Greece, Iceland, Irish Republic, Italy, Luxembourg, Netherlands, Portugal, Spain, Sweden and Switzerland.

Delivery Help & FAQs

Returns Information

If you are not completely satisfied with your purchase*, you may return it to us in its original condition with in 30 days of receiving your delivery or collection notification email for a refund. Except for damaged items or delivery issues the cost of return postage is borne by the buyer. Your statutory rights are not affected.

* For Exclusions and terms on damaged or delivery issues see Returns Help & FAQs

You might also like

Protecting Your Children Online: What...
(Hardback)
Kimberly Ann McCabe
 
 
£22.95
 

Currently out of stock

Mobile Cloud Computing: Foundations...
(Paperback)
Huijun Wu; Dijiang Huang
 
 
£62.95
 
Intrusion Detection and Prevention ...
(Hardback)
George Kambourakis; Asaf Shabtai;...
 
 
£110.00
 
150 Things You Should Know about...
(Paperback)
Lawrence J. Fennelly; Marianna Perry
 
 
£55.95
 
Latest Blog
#FoylesFave: Dr Seuss
25/09/2017

Matt from our Web Team is very silly. Maybe this explains his love for Dr Seuss, especially this new glow in the dark edition of What Was I Scared Of?

Read an Extract from A Skinful of Shadows
21/09/2017

Read an extract from the eagerly awaited new novel by the Costa-winning Frances Hardinge, A Skinful of Shadows.

#FoylesFive: Elsewhere-Elsewhen
18/09/2017

Jen from the Web Team shares a selection of books that will transport the reader to another time and place.

View all Blog Entries
Twitter
Show/Hide Tweets
© W&G Foyle Ltd