Zum Hauptinhalt springen
Dekorationsartikel gehören nicht zum Leistungsumfang.
Violent Python
A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
Taschenbuch von Tj O'Connor
Sprache: Englisch

47,95 €*

inkl. MwSt.

Versandkostenfrei per Post / DHL

Lieferzeit 1-2 Wochen

Kategorien:
Beschreibung
Violent Python shows you how to move from a theoretical understanding of offensive computing to a practical implementation of offensive computing. The book focuses specifically on penetration testing, nefarious web activities, and forensic, wireless and network analysis using the Python programming language. You will learn and understand how to create software that attacks various computer systems, forensically analyzes digital evidence, and creates programs that target wireless and mobile devices. Specific hands-on examples include using the radio on a mobile phone, automating the process of breaking into several computers simultaneously, and data mining on social networking sites. Written as a cookbook for pen testers, this book shows how to exploit networks and build pen testing tools, allowing readers to think like attackers and defend their systems.
Violent Python shows you how to move from a theoretical understanding of offensive computing to a practical implementation of offensive computing. The book focuses specifically on penetration testing, nefarious web activities, and forensic, wireless and network analysis using the Python programming language. You will learn and understand how to create software that attacks various computer systems, forensically analyzes digital evidence, and creates programs that target wireless and mobile devices. Specific hands-on examples include using the radio on a mobile phone, automating the process of breaking into several computers simultaneously, and data mining on social networking sites. Written as a cookbook for pen testers, this book shows how to exploit networks and build pen testing tools, allowing readers to think like attackers and defend their systems.
Über den Autor
TJ O'Connor is a Department of Defense expert on information security and a US Army paratrooper. While assigned as an assistant professor at the US Military Academy, TJ taught undergraduate courses on forensics, exploitation and information assurance. He twice co-coached the winning team at the National Security Agency's annual Cyber Defense Exercise and won the National Defense University's first annual Cyber Challenge. He has served on multiple red teams, including twice on the Northeast Regional Team for the National Collegiate Cyber Defense Competition.

TJ holds a Master of Science degree in Computer Science from North Carolina State, a Master of Science degree in Information Security Engineering from the SANS Technical Institute, and a Bachelor of Science degree in Computer Science from the US Military Academy. He has published technical research at USENIX workshops, ACM conferences, security conferences, the SANS Reading Room, the Internet Storm Center, the Army Magazine, and the Armed Forces Journal. He holds expert cyber security credentials, including the prestigious GIAC Security Expert (GSE) and Offensive Security Certified Expert (OSCE). TJ is a member of the elite SANS Red and Blue Team Cyber Guardians.

TJ O'Connor is an active duty Army Major and former faculty member at the United States Military Academy, where he taught courses on forensics, exploitation, and information assurance. He has published research at USENIX workshops, ACM Conferences, and spoken at various security conferences, including ShmooCon. He has participated in numerous cyber defense exercises, including winning the National Defense University Cyber Challenge, coaching the winning team at the National Security Agency's Cyber Defense Exercise and working as a red team member of the Northeast Regional Collegiate Cyber Defense Competition. He has earned the SANS Certifications GIAC Gold certifications in GCFA, GCIH, GSEC, GCIA, and holds other GIAC certifications.

Inhaltsverzeichnis

1. Introduction

2. Penetration Testing with Python

3. Forensic Investigations with Python

4. Network Traffic Analysis with Python

5. Wireless Mayhem with Python

6. Web Recon with Python

7. Antivirus Evasion with Python

Details
Erscheinungsjahr: 2012
Fachbereich: Programmiersprachen
Genre: Importe, Informatik
Rubrik: Naturwissenschaften & Technik
Medium: Taschenbuch
Inhalt: Kartoniert / Broschiert
ISBN-13: 9781597499576
ISBN-10: 1597499579
Sprache: Englisch
Einband: Kartoniert / Broschiert
Autor: O'Connor, Tj
Hersteller: Syngress Media,U.S.
Verantwortliche Person für die EU: Produktsicherheitsverantwortliche/r, Europaallee 1, D-36244 Bad Hersfeld, gpsr@libri.de
Maße: 231 x 191 x 20 mm
Von/Mit: Tj O'Connor
Erscheinungsdatum: 17.12.2012
Gewicht: 0,548 kg
Artikel-ID: 106360354
Über den Autor
TJ O'Connor is a Department of Defense expert on information security and a US Army paratrooper. While assigned as an assistant professor at the US Military Academy, TJ taught undergraduate courses on forensics, exploitation and information assurance. He twice co-coached the winning team at the National Security Agency's annual Cyber Defense Exercise and won the National Defense University's first annual Cyber Challenge. He has served on multiple red teams, including twice on the Northeast Regional Team for the National Collegiate Cyber Defense Competition.

TJ holds a Master of Science degree in Computer Science from North Carolina State, a Master of Science degree in Information Security Engineering from the SANS Technical Institute, and a Bachelor of Science degree in Computer Science from the US Military Academy. He has published technical research at USENIX workshops, ACM conferences, security conferences, the SANS Reading Room, the Internet Storm Center, the Army Magazine, and the Armed Forces Journal. He holds expert cyber security credentials, including the prestigious GIAC Security Expert (GSE) and Offensive Security Certified Expert (OSCE). TJ is a member of the elite SANS Red and Blue Team Cyber Guardians.

TJ O'Connor is an active duty Army Major and former faculty member at the United States Military Academy, where he taught courses on forensics, exploitation, and information assurance. He has published research at USENIX workshops, ACM Conferences, and spoken at various security conferences, including ShmooCon. He has participated in numerous cyber defense exercises, including winning the National Defense University Cyber Challenge, coaching the winning team at the National Security Agency's Cyber Defense Exercise and working as a red team member of the Northeast Regional Collegiate Cyber Defense Competition. He has earned the SANS Certifications GIAC Gold certifications in GCFA, GCIH, GSEC, GCIA, and holds other GIAC certifications.

Inhaltsverzeichnis

1. Introduction

2. Penetration Testing with Python

3. Forensic Investigations with Python

4. Network Traffic Analysis with Python

5. Wireless Mayhem with Python

6. Web Recon with Python

7. Antivirus Evasion with Python

Details
Erscheinungsjahr: 2012
Fachbereich: Programmiersprachen
Genre: Importe, Informatik
Rubrik: Naturwissenschaften & Technik
Medium: Taschenbuch
Inhalt: Kartoniert / Broschiert
ISBN-13: 9781597499576
ISBN-10: 1597499579
Sprache: Englisch
Einband: Kartoniert / Broschiert
Autor: O'Connor, Tj
Hersteller: Syngress Media,U.S.
Verantwortliche Person für die EU: Produktsicherheitsverantwortliche/r, Europaallee 1, D-36244 Bad Hersfeld, gpsr@libri.de
Maße: 231 x 191 x 20 mm
Von/Mit: Tj O'Connor
Erscheinungsdatum: 17.12.2012
Gewicht: 0,548 kg
Artikel-ID: 106360354
Sicherheitshinweis

Ähnliche Produkte

Ähnliche Produkte