Christopher Duffy - Learning Penetration Testing with Python.pdf
(
4843 KB
)
Pobierz
Learning Penetration Testing
with Python
Utilize Python scripting to execute effective and efficient
penetration tests
Christopher Duffy
BIRMINGHAM - MUMBAI
Learning Penetration Testing with Python
Copyright © 2015 Packt Publishing
All rights reserved. No part of this book may be reproduced, stored in a retrieval
system, or transmitted in any form or by any means, without the prior written
permission of the publisher, except in the case of brief quotations embedded in
critical articles or reviews.
Every effort has been made in the preparation of this book to ensure the accuracy
of the information presented. However, the information contained in this book is
sold without warranty, either express or implied. Neither the author, nor Packt
Publishing, and its dealers and distributors will be held liable for any damages
caused or alleged to be caused directly or indirectly by this book.
Packt Publishing has endeavored to provide trademark information about all of the
companies and products mentioned in this book by the appropriate use of capitals.
However, Packt Publishing cannot guarantee the accuracy of this information.
First published: September 2015
Production reference: 1280915
Published by Packt Publishing Ltd.
Livery Place
35 Livery Street
Birmingham B3 2PB, UK.
ISBN 978-1-78528-232-4
www.packtpub.com
Credits
Author
Christopher Duffy
Reviewers
S Boominathan
Tajinder Singh Kalsi
Luke Presland
Commissioning Editor
Sarah Crofton
Acquisition Editor
Vivek Anantharaman
Content Development Editor
Siddhesh Salvi
Technical Editor
Utkarsha S. Kadam
Copy Editors
Tani Kothari
Ulka Manjrekar
Vikrant Phadke
Project Coordinator
Kranti Berde
Proofreader
Safis Editing
Indexer
Tejal Daruwale Soni
Production Coordinator
Aparna Bhagat
Cover Work
Aparna Bhagat
Disclaimer
All the techniques shown here are based on theory, craft, situations, and team
members and I have encountered. They are not, however, clones of organizations'
environments that have been assessed. Instead, they point out some examples of
common cybersecurity issues and breakdowns in the security strategy that can be
taken advantage of. Additionally, these views are of my own and do not represent
my current or former employers.
Plik z chomika:
tion
Inne pliki z tego folderu:
Vincent Theron, Michael Diamant - Scala High Performance Programming.pdf
(5437 KB)
Vincent Theron, Michael Diamant - Scala High Performance Programming.epub
(3999 KB)
Vincent Theron, Michael Diamant - Scala High Performance Programming.mobi
(6140 KB)
Vincent Theron, Michael Diamant - Scala High Performance Programming.zip
(335 KB)
Tony Fischetti - Data Analysis with R.epub
(9098 KB)
Inne foldery tego chomika:
Book
Cisco CCNA
MCSA Windows Server 2012
Microsoft
Microsoft Azure Virtual Training Day
Zgłoś jeśli
naruszono regulamin