Python for Cybersecurity: Using Python for Cyber Offense and Defense
- Length: 240 pages
- Edition: 1
- Language: English
- Publisher: Wiley
- Publication Date: 2022-03-22
- ISBN-10: 1119850649
- ISBN-13: 9781119850649
- Sales Rank: #2217620 (See Top 100 Books)
Discover an up-to-date and authoritative exploration of Python cybersecurity strategies
Python For Cybersecurity: Using Python for Cyber Offense and Defense delivers an intuitive and hands-on explanation of using Python for cybersecurity. It relies on the MITRE ATT&CK framework to structure its exploration of cyberattack techniques, attack defenses, and the key cybersecurity challenges facing network administrators and other stakeholders today.
Offering downloadable sample code, the book is written to help you discover how to use Python in a wide variety of cybersecurity situations, including:
- Reconnaissance, resource development, initial access, and execution
- Persistence, privilege escalation, defense evasion, and credential access
- Discovery, lateral movement, collection, and command and control
- Exfiltration and impact
Each chapter includes discussions of several techniques and sub-techniques that could be used to achieve an attacker’s objectives in any of these use cases. The ideal resource for anyone with a professional or personal interest in cybersecurity, Python For Cybersecurity offers in-depth information about a wide variety of attacks and effective, Python-based defenses against them.
Cover Table of Contents Title Page Introduction How This Book Is Organized Tools You Will Need From Here CHAPTER 1: Fulfilling Pre-ATT&CK Objectives Active Scanning Search Open Technical Databases Summary Suggested Exercises CHAPTER 2: Gaining Initial Access Valid Accounts Replication Through Removable Media Summary Suggested Exercises CHAPTER 3:Achieving Code Execution Windows Management Instrumentation Scheduled Task/Job Summary Suggested Exercises CHAPTER 4: Maintaining Persistence Boot or Logon Autostart Execution Hijack Execution Flow Summary Suggested Exercises CHAPTER 5: Performing Privilege Escalation Boot or Logon Initialization Scripts Hijack Execution Flow Summary Suggested Exercises CHAPTER 6: Evading Defenses Impair Defenses Hide Artifacts Summary Suggested Exercises CHAPTER 7: Accessing Credentials Credentials from Password Stores Network Sniffing Summary Suggested Exercises CHAPTER 8: Performing Discovery Account Discovery File and Directory Discovery Summary Suggested Exercises CHAPTER 9: Moving Laterally Remote Services Use Alternative Authentication Material Summary Suggested Exercises CHAPTER 10: Collecting Intelligence Clipboard Data Email Collection Summary Suggested Exercises CHAPTER 11: Implementing Command and Control Encrypted Channel Protocol Tunneling Summary Suggested Exercises CHAPTER 12: Exfiltrating Data Alternative Protocols Non-Application Layer Protocols Summary Suggested Exercises CHAPTER 13: Achieving Impact Data Encrypted for Impact Account Access Removal Summary Suggested Exercises Index Copyright Dedication About the Author Acknowledgments About the Technical Editor End User License Agreement
Donate to keep this site alive
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.