Effective Python Penetration Testing

Pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools
Preview in Mapt

Effective Python Penetration Testing

Rejah Rehim

3 customer reviews
Pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools
Mapt Subscription
FREE
$29.99/m after trial
eBook
$22.40
RRP $31.99
Save 29%
Print + eBook
$39.99
RRP $39.99
What do I get with a Mapt Pro subscription?
  • Unlimited access to all Packt’s 5,000+ eBooks and Videos
  • Early Access content, Progress Tracking, and Assessments
  • 1 Free eBook or Video to download and keep every month after trial
What do I get with an eBook?
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with Print & eBook?
  • Get a paperback copy of the book delivered to you
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with a Video?
  • Download this Video course in MP4 format
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
$0.00
$22.40
$39.99
$29.99p/m after trial
RRP $31.99
RRP $39.99
Subscription
eBook
Print + eBook
Start 30 Day Trial

Frequently bought together


Effective Python Penetration Testing Book Cover
Effective Python Penetration Testing
$ 31.99
$ 22.40
Python: Web Development with Penetration Testing Book Cover
Python: Web Development with Penetration Testing
$ 124.99
$ 106.25
Buy 2 for $35.00
Save $121.98
Add to Cart
Subscribe and access every Packt eBook & Video.
 
  • 5,000+ eBooks & Videos
  • 50+ New titles a month
  • 1 Free eBook/Video to keep every month
Start Free Trial
 

Book Details

ISBN 139781785280696
Paperback164 pages

Book Description

Penetration testing is a practice of testing a computer system, network, or web application to find weaknesses in security that an attacker can exploit. Effective Python Penetration Testing will help you utilize your Python scripting skills to safeguard your networks from cyberattacks.

We will begin by providing you with an overview of Python scripting and penetration testing. You will learn to analyze network traffic by writing Scapy scripts and will see how to fingerprint web applications with Python libraries such as ProxMon and Spynner.

Moving on, you will find out how to write basic attack scripts, and will develop debugging and reverse engineering skills with Python libraries. Toward the end of the book, you will discover how to utilize cryptography toolkits in Python and how to automate Python tools and libraries.

Table of Contents

Chapter 1: Python Scripting Essentials
Setting up the scripting environment
Installing third-party libraries
Python language essentials
Summary
Chapter 2: Analyzing Network Traffic with Scapy
Sockets modules
Raw socket programming
Investigate network traffic with Scapy
Summary
Chapter 3: Application Fingerprinting with Python
Web scraping
Parsing HTML with lxml
OS fingerprinting
Get the EXIF data of an image
Web application fingerprinting
Summary
Chapter 4: Attack Scripting with Python
Injections
Broken authentication
Cross-site scripting (XSS)
Insecure direct object references
Security misconfiguration
Sensitive data exposure
Missing function level access control
CSRF attacks
Using components with known vulnerabilities
Unvalidated redirects and forwards
Summary
Chapter 5: Fuzzing and Brute-Forcing
Fuzzing
Classification of fuzzers
Fuzzing and brute-forcing passwords
Dictionary attack
SSH brute-forcing
SMTP brute-forcing
Brute-forcing directories and file locations
Brute-force cracking password protected ZIP files
Summary
Chapter 6: Debugging and Reverse Engineering
Reverse engineering
Portable executable analysis
Listing all imported and exported symbols
Disassembling with Capstone
PEfile with Capstone
Debugging
Using PyDBG
Summary
Chapter 7: Crypto, Hash, and Conversion Functions
Cryptographic algorithms
Hash functions
Summary
Chapter 8: Keylogging and Screen Grabbing
Keyloggers
Keyloggers with pyhook
Screen grabbing
Summary
Chapter 9: Attack Automation
Paramiko
python-nmap
W3af REST API
Metasploit scripting with MSGRPC
ClamAV antivirus with Python
OWASP ZAP from Python
Accessing Nessus 6 API with Python
Summary
Chapter 10: Looking Forward
Pentestly
Twisted
Nscan
sqlmap
CapTipper
Immunity Debugger
pytbull
ghost.py
peepdf
Summary

What You Will Learn

  • Write Scapy scripts to investigate network traffic
  • Get to know application fingerprinting techniques with Python
  • Understand the attack scripting techniques
  • Write fuzzing tools with pentesting requirements
  • Learn basic attack scripting methods
  • Utilize cryptographic toolkits in Python
  • Automate pentesting with Python tools and libraries

Authors

Table of Contents

Chapter 1: Python Scripting Essentials
Setting up the scripting environment
Installing third-party libraries
Python language essentials
Summary
Chapter 2: Analyzing Network Traffic with Scapy
Sockets modules
Raw socket programming
Investigate network traffic with Scapy
Summary
Chapter 3: Application Fingerprinting with Python
Web scraping
Parsing HTML with lxml
OS fingerprinting
Get the EXIF data of an image
Web application fingerprinting
Summary
Chapter 4: Attack Scripting with Python
Injections
Broken authentication
Cross-site scripting (XSS)
Insecure direct object references
Security misconfiguration
Sensitive data exposure
Missing function level access control
CSRF attacks
Using components with known vulnerabilities
Unvalidated redirects and forwards
Summary
Chapter 5: Fuzzing and Brute-Forcing
Fuzzing
Classification of fuzzers
Fuzzing and brute-forcing passwords
Dictionary attack
SSH brute-forcing
SMTP brute-forcing
Brute-forcing directories and file locations
Brute-force cracking password protected ZIP files
Summary
Chapter 6: Debugging and Reverse Engineering
Reverse engineering
Portable executable analysis
Listing all imported and exported symbols
Disassembling with Capstone
PEfile with Capstone
Debugging
Using PyDBG
Summary
Chapter 7: Crypto, Hash, and Conversion Functions
Cryptographic algorithms
Hash functions
Summary
Chapter 8: Keylogging and Screen Grabbing
Keyloggers
Keyloggers with pyhook
Screen grabbing
Summary
Chapter 9: Attack Automation
Paramiko
python-nmap
W3af REST API
Metasploit scripting with MSGRPC
ClamAV antivirus with Python
OWASP ZAP from Python
Accessing Nessus 6 API with Python
Summary
Chapter 10: Looking Forward
Pentestly
Twisted
Nscan
sqlmap
CapTipper
Immunity Debugger
pytbull
ghost.py
peepdf
Summary

Book Details

ISBN 139781785280696
Paperback164 pages
Read More
From 3 reviews

Read More Reviews

Recommended for You

Python Machine Learning Book Cover
Python Machine Learning
$ 35.99
$ 25.20
Instant Penetration Testing: Setting Up a Test Lab How-to Book Cover
Instant Penetration Testing: Setting Up a Test Lab How-to
$ 14.99
$ 10.50
Learning Penetration Testing with Python Book Cover
Learning Penetration Testing with Python
$ 39.99
$ 28.00
Mastering Object-oriented Python Book Cover
Mastering Object-oriented Python
$ 26.99
$ 18.90
Python GUI Programming Cookbook Book Cover
Python GUI Programming Cookbook
$ 35.99
$ 25.20
Mastering Python Book Cover
Mastering Python
$ 31.99
$ 22.40