Python Ethical Hacking from Scratch: Think like an ethical hacker, avoid detection, and successfully develop, deploy, detect, and avoid malware
暫譯: 從零開始的 Python 道德駭客:像道德駭客一樣思考,避免被檢測,成功開發、部署、檢測和避免惡意軟體

Sarwar, Fahad Ali

  • 出版商: Packt Publishing
  • 出版日期: 2021-06-25
  • 售價: $1,600
  • 貴賓價: 9.5$1,520
  • 語言: 英文
  • 頁數: 214
  • 裝訂: Quality Paper - also called trade paper
  • ISBN: 1838829504
  • ISBN-13: 9781838829506
  • 相關分類: Python程式語言Scratch駭客 Hack
  • 立即出貨 (庫存=1)

買這商品的人也買了...

相關主題

商品描述

Key Features

  • Get hands-on with ethical hacking and learn to think like a real-life hacker
  • Build practical ethical hacking tools from scratch with the help of real-world examples
  • Leverage Python 3 to develop malware and modify its complexities

Book Description

Penetration testing enables you to evaluate the security or strength of a computer system, network, or web application that an attacker can exploit. With this book, you'll understand why Python is one of the fastest-growing programming languages for penetration testing. You'll find out how to harness the power of Python and pentesting to enhance your system security.

Developers working with Python will be able to put their knowledge and experience to work with this practical guide. Complete with step-by-step explanations of essential concepts and practical examples, this book takes a hands-on approach to help you build your own pentesting tools for testing the security level of systems and networks. You'll learn how to develop your own ethical hacking tools using Python and explore hacking techniques to exploit vulnerabilities in networks and systems. Finally, you'll be able to get remote access to target systems and networks using the tools you develop and modify as per your own requirements.

By the end of this ethical hacking book, you'll have developed the skills needed for building cybersecurity tools and learned how to secure your systems by thinking like a hacker.

What you will learn

  • Understand the core concepts of ethical hacking
  • Develop custom hacking tools from scratch to be used for ethical hacking purposes
  • Discover ways to test the cybersecurity of an organization by bypassing protection schemes
  • Develop attack vectors used in real cybersecurity tests
  • Test the system security of an organization or subject by identifying and exploiting its weaknesses
  • Gain and maintain remote access to target systems
  • Find ways to stay undetected on target systems and local networks

Who this book is for

If you want to learn ethical hacking by developing your own tools instead of just using the prebuilt tools, this book is for you. A solid understanding of fundamental Python concepts is expected. Some complex Python concepts are explained in the book, but the goal is to teach ethical hacking, not Python.

商品描述(中文翻譯)

**主要特點**

- 實際操作倫理駭客技術,學會像真正的駭客一樣思考
- 從零開始構建實用的倫理駭客工具,並輔以真實案例
- 利用 Python 3 開發惡意軟體並修改其複雜性

**書籍描述**

滲透測試使您能夠評估計算機系統、網絡或網頁應用程序的安全性或強度,這些都是攻擊者可以利用的。通過本書,您將了解為什麼 Python 是滲透測試中增長最快的程式語言之一。您將學會如何利用 Python 和滲透測試的力量來增強系統安全性。

使用 Python 的開發人員將能夠將他們的知識和經驗應用於這本實用指南中。本書提供了關鍵概念的逐步解釋和實用範例,採取實踐方法幫助您構建自己的滲透測試工具,以測試系統和網絡的安全級別。您將學會如何使用 Python 開發自己的倫理駭客工具,並探索駭客技術以利用網絡和系統中的漏洞。最後,您將能夠使用您開發和根據自身需求修改的工具,遠程訪問目標系統和網絡。

在這本倫理駭客書籍結束時,您將具備構建網絡安全工具所需的技能,並學會如何通過像駭客一樣思考來保護您的系統。

**您將學到的內容**

- 理解倫理駭客的核心概念
- 從零開始開發自定義駭客工具,用於倫理駭客目的
- 探索繞過保護機制來測試組織的網絡安全性的方法
- 開發在實際網絡安全測試中使用的攻擊向量
- 通過識別和利用其弱點來測試組織或主題的系統安全性
- 獲得並維持對目標系統的遠程訪問
- 找到在目標系統和本地網絡中保持隱蔽的方法

**本書適合誰**

如果您想通過開發自己的工具來學習倫理駭客,而不僅僅是使用預建工具,那麼這本書適合您。預期您對基本的 Python 概念有扎實的理解。本書中解釋了一些複雜的 Python 概念,但目標是教授倫理駭客,而不是 Python。

作者簡介

Fahad has been teaching ethical hacking and penetration testing on different online platforms with a solid student base. He's passionate about cybersecurity and ethical hacking tool development.

作者簡介(中文翻譯)

Fahad 在不同的線上平台教授倫理駭客和滲透測試,擁有穩固的學生基礎。他對網路安全和倫理駭客工具的開發充滿熱情。

目錄大綱

Table of Contents

1. Introduction and What it means to be a hacker
2. Getting started - Setting up lab environment and tools required
3. Reconnaissance and information gathering
4. Network scanning - Discovering targets
5. Network attacks - Man in the middle attack
6. Malware development - Creating your own malware
7. Advanced malware
8. Post exploitation
9. Protection - How to avoid detection

目錄大綱(中文翻譯)

Table of Contents

1. Introduction and What it means to be a hacker

2. Getting started - Setting up lab environment and tools required

3. Reconnaissance and information gathering

4. Network scanning - Discovering targets

5. Network attacks - Man in the middle attack

6. Malware development - Creating your own malware

7. Advanced malware

8. Post exploitation

9. Protection - How to avoid detection