The toughest thing most assessors have to contend with is figuring a way to break into an internal network from over the Internet without phishing the organization's populace. There are occasionally widely exposed networks, but the majority of organizations have learned to tighten their external perimeters. Unfortunately, there is still the systemic problem of a hard exterior, and then a softer interior with light monitoring controls, which are not structured to prevent real malicious actors from compromising resources. This means that we should simulate the activity that malicious actors execute to crack the perimeter. This in turn means understanding what the typical perimeter looks like today.
Learning Penetration Testing with Python
By :
Learning Penetration Testing with Python
By:
Overview of this book
Table of Contents (19 chapters)
Learning Penetration Testing with Python
Credits
Disclaimer
About the Author
Acknowlegements
About the Reviewers
www.PacktPub.com
Preface
Free Chapter
Understanding the Penetration Testing Methodology
The Basics of Python Scripting
Identifying Targets with Nmap, Scapy, and Python
Executing Credential Attacks with Python
Exploiting Services with Python
Assessing Web Applications with Python
Cracking the Perimeter with Python
Exploit Development with Python, Metasploit, and Immunity
Automating Reports and Tasks with Python
Adding Permanency to Python Tools
Index
Customer Reviews