Skip to content

Commit

Permalink
readme file
Browse files Browse the repository at this point in the history
  • Loading branch information
pysush committed May 31, 2018
1 parent e8748f0 commit 53e8aed
Showing 1 changed file with 32 additions and 2 deletions.
34 changes: 32 additions & 2 deletions README.md
Original file line number Diff line number Diff line change
@@ -1,2 +1,32 @@
# Python-Penetration-Testing-Essentials-Second-Edition
Python Penetration Testing Essentials, Second Edition, published by Packt
# Python Penetration Testing Essentials - Second Edition
This is the code repository for [Python Penetration Testing Essentials - Second Edition](https://www.packtpub.com/networking-and-servers/python-penetration-testing-essentials-second-edition?utm_source=github&utm_medium=repository&utm_campaign=9781789138962), published by [Packt](https://www.packtpub.com/?utm_source=github). It contains all the supporting project files necessary to work through the book from start to finish.
## About the Book
This book gives you the skills you need to use Python for penetration testing (pentesting), with the help of detailed code examples.

We start by exploring the basics of networking with Python and then proceed to network hacking. Then, you will delve into exploring Python libraries to perform various types of pentesting and ethical hacking techniques. Next, we delve into hacking the application layer, where we start by gathering information from a website. We then move on to concepts related to website hacking—such as parameter tampering, DDoS, XSS, and SQL injection.

By reading this book, you will learn different techniques and methodologies that will familiarize you with Python pentesting techniques, how to protect yourself, and how to create automated programs to find the admin console, SQL injection, and XSS attacks.

## Instructions and Navigation
All of the code is organized into folders. Each folder starts with a number followed by the application name. For example, Chapter02.



The code will look like the following:
```
import os
response = os.popen('ping -n 1 10.0.0.1')
for line in response.readlines():
print line,
```

In order to understand the book reader must have the knowledge of Networking fundamentals, basic knowledge of Linux OS, good knowledge of information security and core Python.

In order to perform experiments or run the codes reader can use the virtual machine (Vmware, virtual box). For Wireless pen-testing readers can use a wireless card TP-Link TL-WN722N. Becuase TL-WN722N wireless card supports the Kali Linux in VMware.

## Related Products
* [Python Penetration Testing Cookbook](https://www.packtpub.com/networking-and-servers/python-penetration-testing-cookbook?utm_source=github&utm_medium=repository&utm_campaign=9781784399771)

* [Kali Linux Cookbook - Second Edition](https://www.packtpub.com/networking-and-servers/kali-linux-cookbook-second-edition?utm_source=github&utm_medium=repository&utm_campaign=9781784390303)

* [Kali Linux Advanced Wireless Penetration Testing [Video]](https://www.packtpub.com/networking-and-servers/kali-linux-advanced-wireless-penetration-testing-video?utm_source=github&utm_medium=repository&utm_campaign=9781788832342)

0 comments on commit 53e8aed

Please sign in to comment.