Python Penetration Testing Essentials.pdf

(3308 KB) Pobierz
Python Penetration Testing
Essentials
Employ the power of Python to get the best out
of pentesting
Mohit
BIRMINGHAM - MUMBAI
Python Penetration Testing Essentials
Copyright © 2015 Packt Publishing
All rights reserved. No part of this book may be reproduced, stored in a retrieval
system, or transmitted in any form or by any means, without the prior written
permission of the publisher, except in the case of brief quotations embedded in
critical articles or reviews.
Every effort has been made in the preparation of this book to ensure the accuracy
of the information presented. However, the information contained in this book is
sold without warranty, either express or implied. Neither the author, nor Packt
Publishing, and its dealers and distributors will be held liable for any damages
caused or alleged to be caused directly or indirectly by this book.
Packt Publishing has endeavored to provide trademark information about all of the
companies and products mentioned in this book by the appropriate use of capitals.
However, Packt Publishing cannot guarantee the accuracy of this information.
First published: January 2015
Production reference: 1220115
Published by Packt Publishing Ltd.
Livery Place
35 Livery Street
Birmingham B3 2PB, UK.
ISBN 978-1-78439-858-3
www.packtpub.com
Credits
Author
Mohit
Reviewers
Milinda Perera
Rejah Rehim
Ishbir Singh
Indexers
Commissioning Editor
Sarah Crofton
Acquisition Editor
Sonali Vernekar
Content Development Editor
Merwyn D'souza
Technical Editors
Vivek Arora
Indrajit A. Das
Copy Editors
Karuna Narayanan
Alfida Paiva
Rekha Nair
Tejal Soni
Graphics
Sheetal Aute
Production Coordinator
Shantanu N. Zagade
Cover Work
Shantanu N. Zagade
Project Coordinator
Neha Bhatnagar
Proofreaders
Ameesha Green
Kevin McGowan
About the Author
programmer, with a keen interest in the field of information security. He has done
his bachelor of technology in computer science from Kurukshetra University,
Kurukshetra, and master of engineering (2012) in computer science from Thapar
University, Patiala. He has written a thesis as well as a research paper on session
hijacking, named
COMPARATIVE ANALYSIS OF SESSION HIJACKING ON
DIFFERENT OPERATING SYSTEMS,
under the guidance of Dr Maninder Singh.
He has also done the CCNA and Certified Ethical Hacking course from EC-Council
(CEH) and has procured a CEH certification. He has published his article,
How to
disable or change web-server signature,
in the eForensics magazine in December 2013. He
has published another article on wireless hacking, named
Beware: Its Easy to Launch
a Wireless Deauthentication Attack!
in
Open Source For You
in July 2014. He is also a
certified Certified Security Analyst (ECSA). He has been working in IBM India for
more than 2 years. He is also a freelance professional trainer for CEH and Python in
CODEC Networks. Apart from this, he is familiar with Red Hat and CentOS Linux
to a great extent, and also has a lot of practical experience of Red Hat. He can be
contacted at
mohitraj.cs@gmail.com
.
First of all, I am grateful to the Almighty for helping me to complete
this book. I would like to thank my mother for her love and
encouraging support, and my father for raising me in a house with
desktops and laptops. A big thanks to my teacher, thesis guide,
and hacking trainer, Dr. Maninder Singh, for his immense help. I
would like to thank my friend, Bhaskar Das, for providing me with
hardware support. I would also like to thank everyone who has
contributed to the publication of this book, including the publisher,
especially the technical reviewers and also the editors Merwyn
D'souza and Sonali Vernekar, for making me laugh at my own
mistakes. Last but not least, I'm grateful to my i7 laptop, without
which it would not have been possible to write this book.
Mohit
(also known as Mohit Raj) is an application developer and Python
Zgłoś jeśli naruszono regulamin