ORPP logo

Python Penetration Testing Cookbook : (Record no. 133752)

MARC details
000 -LEADER
fixed length control field 06652nam a22004573i 4500
001 - CONTROL NUMBER
control field EBC5165110
003 - CONTROL NUMBER IDENTIFIER
control field MiAaPQ
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240729131635.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 240724s2017 xx o ||||0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781784394097
Qualifying information (electronic bk.)
035 ## - SYSTEM CONTROL NUMBER
System control number (MiAaPQ)EBC5165110
035 ## - SYSTEM CONTROL NUMBER
System control number (Au-PeEL)EBL5165110
035 ## - SYSTEM CONTROL NUMBER
System control number (CaPaEBR)ebr11475308
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1014431979
040 ## - CATALOGING SOURCE
Original cataloging agency MiAaPQ
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency MiAaPQ
Modifying agency MiAaPQ
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.73.P98 .R445 2017
082 0# - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.133
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Rehim, Rejah.
245 10 - TITLE STATEMENT
Title Python Penetration Testing Cookbook :
Remainder of title Over 50+ Hands-On Recipes to Help You Pen Test Networks Using Python, Discover Vulnerabilities, and Find a Recovery Path.
250 ## - EDITION STATEMENT
Edition statement 1st ed.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Birmingham :
Name of producer, publisher, distributor, manufacturer Packt Publishing, Limited,
Date of production, publication, distribution, manufacture, or copyright notice 2017.
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Date of production, publication, distribution, manufacture, or copyright notice ©2016.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (216 pages)
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Intro -- Title Page -- Copyright -- Credits -- About the Author -- About the Reviewers -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Why Python in Penetration Testing? -- Introduction -- Why Python is a great option for security scripting -- Getting ready -- How to do it... -- Python can be used in both  and interpreted and compiled forms -- Syntax and indented layout -- Simple learning curve -- Powerful third-party libraries -- Cross-platform (code anywhere) -- Python 3 language basics and differences -- Getting ready -- How to do it... -- Python 2 -- Python 3 -- Python 2.7 -- Key differences between Python 2.7 and Python 3 -- Chapter 2: Setting Up a Python Environment -- Introduction -- Setting up a Python environment in Linux -- Getting ready -- How to do it... -- Installing Python -- Setting up a virtual environment -- Setting up the editor or IDE -- Setting up a Python environment in macOS -- Getting ready -- How to do it... -- Installing Python -- Setting up a Python environment in Windows -- How to do it... -- Chapter 3: Web Scraping with Python -- Introduction -- Download web pages with Python scripts -- Getting ready -- How to do it... -- With Python 2 -- With Python 3 -- Changing the user agent -- How to do it... -- Downloading files -- Getting ready -- How to do it... -- Using a regular expression to get the information from the downloaded web pages -- How to do it... -- Requesting and downloading dynamic website pages -- Escaping invalid characters -- How to do it... -- Dynamic GET requests -- How to do it... -- Chapter 4: Data Parsing with Python -- Introduction -- Parsing HTML tables -- Getting ready -- How to do it... -- Extracting data from HTML documents -- Getting ready -- How to do it... -- Parsing XML data -- Getting ready -- How to do it.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 5: Web Scraping with Scrapy and BeautifulSoup -- Introduction -- Web spiders with Scrapy -- Getting ready -- How to do it... -- Scrapy shell -- How to do it... -- Link extractor with Scrapy -- How to do it... -- Scraping after logging into websites using Scrapy -- Getting ready -- How to do it... -- Chapter 6: Network Scanning with Python -- Introduction -- Simple port scanner -- Getting ready -- How to do it... -- IP range/network scanner -- Getting ready -- How to do it... -- Stealth scanning -- Getting ready -- How to do it... -- FIN scanning -- How to do it... -- XMAS scanning -- How to do it... -- TCP ACK scanning -- How to do it... -- LanScan -- Getting ready -- How to do it... -- Chapter 7: Network Sniffing with Python -- Introduction -- Packet sniffer in Python -- Getting ready -- How to do it... -- Parsing the packet -- How to do it... -- PyShark -- Getting ready -- How to do it... -- Chapter 8: Scapy Basics -- Introduction -- Creating a packet with Scapy -- Getting ready -- How to do it... -- Sending and receiving packets with Scapy -- How to do it... -- Layering packets -- How to do it... -- Reading and writing to pcap files -- How to do it... -- Sniffing packets -- How to do it... -- ARP man-in-the-middle tool with Scapy -- How to do it... -- Chapter 9: Wi-Fi Sniffing -- Introduction -- Finding Wi-Fi devices -- Getting ready -- How to do it... -- Linux -- macOS -- Finding SSIDs -- How to do it... -- Exposing hidden SSIDs -- How to do it... -- Dictionary attack on hidden SSIDs -- How to do it... -- Fake access points with Scapy -- How to do it... -- Chapter 10: Layer 2 Attacks -- Introduction -- ARP Watcher -- How to do it... -- ARP cache poisoning -- Getting ready -- Linux -- macOS -- How to do it... -- MAC flooder -- How to do it... -- VLAN hopping -- How to do it... -- ARP spoofing over VLAN hopping -- How to do it.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note DHCP starvation -- How to do it... -- Chapter 11: TCP/IP Attacks -- Introduction -- IP spoofing -- How to do it... -- SYN flooding -- How to do it... -- Password sniffer with Python over LAN -- How to do it... -- Chapter 12: Introduction to Exploit Development -- Introduction -- CPU registers -- Getting ready -- General purpose registers -- Special purpose registers -- How to do it... -- Memory dump -- How to do it... -- CPU instructions -- How to do it... -- Chapter 13: Windows Exploit Development -- Introduction -- Windows memory layout -- Getting ready -- The stack -- The heap -- Program image and dynamic link libraries -- Process Environment Block (PEB) -- Thread Environment Block (TEB) -- How to do it... -- Buffer overflow with saved return pointer overwrite -- Getting ready -- Installing Mona -- How to do it... -- Structured Exception Handling -- Getting ready -- How to do it... -- Egg hunters -- Getting ready -- How to do it... -- Chapter 14: Linux Exploit Development -- Introduction -- Format string exploitation -- Getting ready -- Global offset table -- Generating shell code -- How to do it... -- Buffer overflow -- How to do it... -- Index.
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note Description based on publisher supplied metadata and other sources.
590 ## - LOCAL NOTE (RLIN)
Local note Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Python (Computer program language).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Programming languages (Computers).
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Mohit.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
Main entry heading Rehim, Rejah
Title Python Penetration Testing Cookbook
Place, publisher, and date of publication Birmingham : Packt Publishing, Limited,c2017
797 2# - LOCAL ADDED ENTRY--CORPORATE NAME (RLIN)
Corporate name or jurisdiction name as entry element ProQuest (Firm)
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://ebookcentral.proquest.com/lib/orpp/detail.action?docID=5165110">https://ebookcentral.proquest.com/lib/orpp/detail.action?docID=5165110</a>
Public note Click to View

No items available.

© 2024 Resource Centre. All rights reserved.