Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover Table of Contents Learning Penetration Testing with Python Learning Penetration Testing with Python Credits Disclaimer About the Author Acknowlegements About the Reviewers www.PacktPub.com Preface What you need for this book Who this book is for Conventions Reader feedback Customer support 1. Understanding the Penetration Testing Methodology Understanding what penetration testing is not Assessment methodologies The penetration testing execution standard Penetration testing tools Summary 2. The Basics of Python Scripting Python – the good and the bad A Python interactive interpreter versus a script Environmental variables and PATH Understanding dynamically typed languages The first Python script Developing scripts and identifying errors Python formatting Python variables Operators Compound statements Functions The Python style guide Arguments and options Your first assessor script Summary 3. Identifying Targets with Nmap, Scapy, and Python Understanding Nmap Nmap libraries for Python The Scapy library for Python Summary 4. Executing Credential Attacks with Python Identifying the target Creating targeted usernames Testing for users using SMTP VRFY Summary 5. Exploiting Services with Python Understanding the chaining of exploits Automating the exploit train with Python Summary 6. Assessing Web Applications with Python Identifying hidden files and directories with Python Credential attacks with Burp Suite Using twill to walk through the source Understanding when to use Python for web assessments Summary 7. Cracking the Perimeter with Python Understanding the link between accounts and services Cracking inboxes with Burp Suite Identifying the attack path Gaining access through websites Summary 8. Exploit Development with Python, Metasploit, and Immunity Understanding the Windows memory structure Understanding memory addresses and endianness Understanding the manipulation of the stack Understanding immunity Understanding basic buffer overflow Writing a basic buffer overflow exploit Understanding stack adjustments Understanding the purpose of local exploits Understanding other exploit scripts Reversing Metasploit modules Understanding protection mechanisms Summary 9. Automating Reports and Tasks with Python Understanding how to create a Python class Summary 10. Adding Permanency to Python Tools Understanding the difference between multithreading and multiprocessing Building industry-standard tools Summary Index
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion