Nouveauté
Python Pen-testing Unleashed : Techniques for Ethical Hacking with Python
Par :Formats :
Disponible dans votre compte client Decitre ou Furet du Nord dès validation de votre commande. Le format ePub est :
- Compatible avec une lecture sur My Vivlio (smartphone, tablette, ordinateur)
- Compatible avec une lecture sur liseuses Vivlio
- Pour les liseuses autres que Vivlio, vous devez utiliser le logiciel Adobe Digital Edition. Non compatible avec la lecture sur les liseuses Kindle, Remarkable et Sony

Notre partenaire de plateforme de lecture numérique où vous retrouverez l'ensemble de vos ebooks gratuitement
Pour en savoir plus sur nos ebooks, consultez notre aide en ligne ici
- FormatePub
- ISBN978-93-48104-04-5
- EAN9789348104045
- Date de parution12/06/2025
- Protection num.pas de protection
- Infos supplémentairesepub
- ÉditeurAuthor Tree Publishing
Résumé
This book is a practical guide that shows you the advantages of using Python for pen-testing, with the help of detailed code examples. This book starts by exploring the basics of networking with Python and then proceeds to network and wireless pen-testing, including information gathering and attacking. You will learn how to build honeypot traps. Later on, we delve into hacking the application layer, where we start by gathering information from a website, and then eventually move on to concepts related to website hacking, such as parameter tampering, DDOS, XSS, and SQL injection.
Who this book is for: If you are a Python programmer, a security researcher, or a network admin who has basic knowledge of Python programming and want to learn about penetration testing with the help of Python, this book is ideal for you. Even if you are new to the field of ethical hacking, this book can help you find the vulnerabilities in your system so that you are ready to tackle any kind of attack or intrusion.
Pratham Pawar is a cybersecurity enthusiast and a second-year Information Technology Engineering student at Vasantdada Patil Prathisthan's College of Engineering and Visual Arts, Mumbai. He is a Certified Ethical Hacker (CEH) and a Microsoft Certified Cyber Security Analyst, with a deep passion for ethical hacking and digital security. With 2 years of professional experience as a penetration tester and 1 year as a cybersecurity analyst, he has honed his skills in identifying and mitigating security vulnerabilities.
His research work has been recognized and published by Springer, and he is also the author of 'Hacker's Handbook: A Beginner's Guide into Ethical Hacking, ' available on Amazon, Flipkart, and Google Play Books
Who this book is for: If you are a Python programmer, a security researcher, or a network admin who has basic knowledge of Python programming and want to learn about penetration testing with the help of Python, this book is ideal for you. Even if you are new to the field of ethical hacking, this book can help you find the vulnerabilities in your system so that you are ready to tackle any kind of attack or intrusion.
Pratham Pawar is a cybersecurity enthusiast and a second-year Information Technology Engineering student at Vasantdada Patil Prathisthan's College of Engineering and Visual Arts, Mumbai. He is a Certified Ethical Hacker (CEH) and a Microsoft Certified Cyber Security Analyst, with a deep passion for ethical hacking and digital security. With 2 years of professional experience as a penetration tester and 1 year as a cybersecurity analyst, he has honed his skills in identifying and mitigating security vulnerabilities.
His research work has been recognized and published by Springer, and he is also the author of 'Hacker's Handbook: A Beginner's Guide into Ethical Hacking, ' available on Amazon, Flipkart, and Google Play Books
This book is a practical guide that shows you the advantages of using Python for pen-testing, with the help of detailed code examples. This book starts by exploring the basics of networking with Python and then proceeds to network and wireless pen-testing, including information gathering and attacking. You will learn how to build honeypot traps. Later on, we delve into hacking the application layer, where we start by gathering information from a website, and then eventually move on to concepts related to website hacking, such as parameter tampering, DDOS, XSS, and SQL injection.
Who this book is for: If you are a Python programmer, a security researcher, or a network admin who has basic knowledge of Python programming and want to learn about penetration testing with the help of Python, this book is ideal for you. Even if you are new to the field of ethical hacking, this book can help you find the vulnerabilities in your system so that you are ready to tackle any kind of attack or intrusion.
Pratham Pawar is a cybersecurity enthusiast and a second-year Information Technology Engineering student at Vasantdada Patil Prathisthan's College of Engineering and Visual Arts, Mumbai. He is a Certified Ethical Hacker (CEH) and a Microsoft Certified Cyber Security Analyst, with a deep passion for ethical hacking and digital security. With 2 years of professional experience as a penetration tester and 1 year as a cybersecurity analyst, he has honed his skills in identifying and mitigating security vulnerabilities.
His research work has been recognized and published by Springer, and he is also the author of 'Hacker's Handbook: A Beginner's Guide into Ethical Hacking, ' available on Amazon, Flipkart, and Google Play Books
Who this book is for: If you are a Python programmer, a security researcher, or a network admin who has basic knowledge of Python programming and want to learn about penetration testing with the help of Python, this book is ideal for you. Even if you are new to the field of ethical hacking, this book can help you find the vulnerabilities in your system so that you are ready to tackle any kind of attack or intrusion.
Pratham Pawar is a cybersecurity enthusiast and a second-year Information Technology Engineering student at Vasantdada Patil Prathisthan's College of Engineering and Visual Arts, Mumbai. He is a Certified Ethical Hacker (CEH) and a Microsoft Certified Cyber Security Analyst, with a deep passion for ethical hacking and digital security. With 2 years of professional experience as a penetration tester and 1 year as a cybersecurity analyst, he has honed his skills in identifying and mitigating security vulnerabilities.
His research work has been recognized and published by Springer, and he is also the author of 'Hacker's Handbook: A Beginner's Guide into Ethical Hacking, ' available on Amazon, Flipkart, and Google Play Books