![](https://padhegaindia.in/wp-content/themes/woodmart/images/lazy.png)
Save: 10%
![](https://padhegaindia.in/wp-content/themes/woodmart/images/lazy.png)
Save: 10%
Learn Penetration Testing with Python 3.x
Publisher:
| Author:
| Language:
| Format:
Publisher:
Author:
Language:
Format:
₹899 ₹809
Save: 10%
In stock
Ships within:
In stock
ISBN:
Page Extent:
This book starts with an understanding of penetration testing and red teaming methodologies and teaches Python 3.x from scratch for those who are not familiar with programming. The book gives the skills of how to create scripts for cracking, and brute force attacks.
The second part of this book focuses on the network and wireless level. The book teaches you the skills of how to create an offensive tool using Python 3.x to identify different services and ports using different Python network modules and conducting network attacks. In the network monitoring section, you will be able to monitor layers 3 and 4. And finally, you will be able to conduct different attacks on wireless.
The last part of this book focuses on web applications and exploitation developments. It focuses on how to create scripts to extract web information such as links, images, documents, etc. It also focuses on how to create scripts to identify and exploit web vulnerabilities and how to bypass WAF. The last chapter of this book focuses on exploitation development starting with how to play with the stack and then moving on to how to use Python in fuzzing and creating exploitation scripts.
This book starts with an understanding of penetration testing and red teaming methodologies and teaches Python 3.x from scratch for those who are not familiar with programming. The book gives the skills of how to create scripts for cracking, and brute force attacks.
The second part of this book focuses on the network and wireless level. The book teaches you the skills of how to create an offensive tool using Python 3.x to identify different services and ports using different Python network modules and conducting network attacks. In the network monitoring section, you will be able to monitor layers 3 and 4. And finally, you will be able to conduct different attacks on wireless.
The last part of this book focuses on web applications and exploitation developments. It focuses on how to create scripts to extract web information such as links, images, documents, etc. It also focuses on how to create scripts to identify and exploit web vulnerabilities and how to bypass WAF. The last chapter of this book focuses on exploitation development starting with how to play with the stack and then moving on to how to use Python in fuzzing and creating exploitation scripts.
About Author
Reviews
There are no reviews yet.
Related products
Oracle Database 11G The Complete Reference (India Edition 13th 2014)
Save: 50%
Distributed Operating Systems Concept And Design (2004)
Save: 60%
Digital Communication Fundamentals And Applications (2nd Ed)
Save: 60%
RELATED PRODUCTS
Head First Java: A Brain-Friendly Guide, Third Edition
Save: 5%
Mastering Bitcoin: Programming the Open Blockchain, Second Edition
Save: 25%
Cryptography and Network Security (2nd Impression 2006)
Save: 60%
Digital Communication Fundamentals And Applications (2nd Ed)
Save: 60%
Distributed Operating Systems Concept And Design (2004)
Save: 60%
Linear Programming for Project Management Professionals
Save: 10%
Oracle Database 11G The Complete Reference (India Edition 13th 2014)
Save: 50%
Software Engineering A Practitioner’s Approach (7th Ed)
Save: 60%
Reviews
There are no reviews yet.