Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Offensive Security Using Python
  • Table Of Contents Toc
  • Feedback & Rating feedback
Offensive Security Using Python

Offensive Security Using Python

By : Rejah Rehim, Manindar Mohan
5 (4)
close
close
Offensive Security Using Python

Offensive Security Using Python

5 (4)
By: Rejah Rehim, Manindar Mohan

Overview of this book

Offensive Security Using Python is your go-to manual for mastering the quick-paced field of offensive security. This book is packed with valuable insights, real-world examples, and hands-on activities to help you leverage Python to navigate the complicated world of web security, exploit vulnerabilities, and automate challenging security tasks. From detecting vulnerabilities to exploiting them with cutting-edge Python techniques, you’ll gain practical insights into web security, along with guidance on how to use automation to improve the accuracy and effectiveness of your security activities. You’ll also learn how to design personalized security automation tools. While offensive security is a great way to stay ahead of emerging threats, defensive security plays an equal role in protecting organizations from cyberattacks. In this book, you’ll get to grips with Python secure coding techniques to improve your ability to recognize dangers quickly and take appropriate action. As you progress, you’ll be well on your way to handling the contemporary challenges in the field of cybersecurity using Python, as well as protecting your digital environment from growing attacks. By the end of this book, you’ll have a solid understanding of sophisticated offensive security methods and be able to stay ahead in the constantly evolving cybersecurity space.
Table of Contents (16 chapters)
close
close
Free Chapter
1
Part 1:Python for Offensive Security
4
Part 2: Python in Offensive Web Security
8
Part 3: Python Automation for Advanced Security Tasks
11
Part 4: Python Defense Strategies for Robust Security

Index

As this ebook edition doesn't have fixed pagination, the page numbers below are hyperlinked for reference only, based on the printed edition of this book.

A

access control, in cloud environments 99

granular access permissions 99

IAM 99

multi-layered access control 99

principle of least privilege (PoLP) 99

programmatic access control mechanisms 100

access controls, cloud security 96

auditing 96

authentication 96

authorization 96

logging 96

active reconnaissance 12

Address Resolution Protocol (ARP) 28

Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) 15

Amazon Resource Name (ARN) 108

Amazon S3 97

Amazon Web Services (AWS) 97

anomalies

visualizing 201

anomaly detection 195, 196

challenges 197

clustering 197

machine learning models 196

statistical analysis 196

techniques 200

APIs 128, 129

components 128

integrating, with external data sources 157, 159...

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech
bookmark search playlist download font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY