PacktPub | Python for Automating Information Security [Video] [FCO]
- CategoryOther
- TypeTutorials
- LanguageEnglish
- Total size572.2 MB
- Uploaded BySunRiseZone
- Downloads294
- Last checkedSep. 27th '20
- Date uploadedSep. 23rd '20
- Seeders 20
- Leechers5
Infohash : 28E2EF179F043B4A812744BC2033870FFC5BC464
Lynda and other Courses >>> https://www.freecoursesonline.me/
For Developer Tools & Apps >>> https://ftuapps.com/
Forum for discussion >>> https://1hack.us/
By : Thomas McNeela
Released : May 2020
Course Source : https://www.packtpub.com/product/python-for-automating-information-security-video/9781838828219
Video Details
ISBN 9781838828219
Course Length 2 hours 38 minutes
About
The process of finding and eradicating an attacker is time-consuming and costs a lot, which hurts your organization. You need to write tools that will help you automate your defensive and offensive security. As a penetration tester, you need to evolve quickly. When off-the-shelf tools and exploits fall short, writing your own tool will help you safeguard your data.
In this course, learn how to leverage Python to perform routine tasks quickly and efficiently. You will automate log analysis and packet analysis with file operations, regular expressions, and analysis modules; interact with websites to collect intelligence; and develop TCP client and server applications for use in penetration testing. You will learn how to build automation tools for information security, and will hopefully find that these examples will help inspire you to design and build your own!
By the end of this course, you will have the skills and confidence you need to automate both offensive and defensive security techniques using Python; and have developed several small security tools and one large comprehensive penetration testing tool, all of which can be used in the real world.
All the code and supporting files for this course are available on GitHub at: https://github.com/PacktPublishing/Python-for-Automating-Information-Security
Author
Thomas McNeela
Thomas McNeela is an experienced information security professional and continuing-education instructor. Over his nine-year career, he has worked for several companies including Motorola Mobility and U.S. Cellular. Thomas specializes in network engineering and security, security assessments, threat intelligence, and automation. He earned a Master of Science (M.S.) degree in Information Systems from Northwestern University and holds many industry-recognized certifications including the CISSP and CEH (Master), and is currently working for information security software and services firm located in the Chicago area.
Files:
[FreeCoursesOnline.Me] PacktPub - Python for Automating Information Security [Video] 0. Websites you may like- 0. (1Hack.Us) Premium Tutorials-Guides-Articles _ Community based Forum.url (0.4 KB)
- 1. (FreeCoursesOnline.Me) Download Udacity, Masterclass, Lynda, PHLearn, Pluralsight Free.url (0.3 KB)
- 3. (FTUApps.com) Download Cracked Developers Applications For Free.url (0.2 KB)
- How you can help our Group!.txt (0.2 KB)
- 01 - The Course Overview.mp4 (13.5 MB)
- 02 - Setting Up Your Virtual Environment.mp4 (11.2 MB)
- 03 - Finding an Exploit Script.mp4 (9.9 MB)
- 04 - Understanding the Script.mp4 (11.5 MB)
- 05 - Modifying the Script.mp4 (19.2 MB)
- 06 - Testing the Script.mp4 (14.0 MB)
- 07 - Viewing a Packet Capture File in Wireshark.mp4 (20.4 MB)
- 08 - Understanding Normal Traffic Patterns.mp4 (17.0 MB)
- 09 - Writing a Python Script to Look for Malicious Network Traffic.mp4 (17.8 MB)
- 10 - Writing a Python Script to Calculate a Network Traffic Baseline.mp4 (22.1 MB)
- 11 - Writing a Python Script to Compare a Baseline Against Network Traffic.mp4 (18.0 MB)
- 12 - What OSINT Is.mp4 (12.1 MB)
- 13 - Enumerating Domain Names with Python.mp4 (15.4 MB)
- 14 - What Is Google Dorking.mp4 (12.9 MB)
- 15 - Automating Google Dorking with Python.mp4 (13.0 MB)
- 16 - Web Directory Enumeration with Python.mp4 (15.5 MB)
- 17 - Reading a Log File.mp4 (15.8 MB)
- 18 - Understanding Normal Log Messages.mp4 (14.6 MB)
- 19 - Writing a Python Script to Look for Logs Indicating Malicious Activity.mp4 (17.6 MB)
- 20 - Writing a Python Script to Calculate a Log Message Baseline.mp4 (17.6 MB)
- 21 - Writing a Python Script to Compare a Baseline Against a Log File.mp4 (14.7 MB)
- 22 - What Is Netcat.mp4 (13.7 MB)
- 23 - Writing the Input Arguments.mp4 (20.1 MB)
- 24 - Writing the Client.mp4 (14.0 MB)
- 25 - Writing the Server.mp4 (17.3 MB)
- 26 - Testing Your Program.mp4 (13.5 MB)
- 27 - Introduction to Passive Network Capture.mp4 (8.5 MB)
- 28 - Writing a Python Packet Sniffer.mp4 (14.4 MB)
- 29 - Capturing Plain-Text Credentials from Network Packets with Python.mp4 (15.2 MB)
- 30 - Introduction to ARP Cache Poisoning.mp4 (9.2 MB)
- 31 - Writing a Python ARP Cache Poisoner.mp4 (17.9 MB)
- 32 - Introduction to the Metasploit Framework.mp4 (20.8 MB)
- 33 - Writing the Discovery Module.mp4 (16.5 MB)
- 34 - Writing the Exploit Framework.mp4 (19.1 MB)
- 35 - Stitching It All Together with an Interactive Command Shell.mp4 (23.7 MB)
- 36 - Testing MSFPY.mp4 (15.3 MB)
- 9781838828219_Code.zip (9.7 MB)
Code:
- udp://opentor.org:2710/announce
- udp://p4p.arenabg.com:1337/announce
- udp://tracker.torrent.eu.org:451/announce
- udp://tracker.cyberia.is:6969/announce
- udp://9.rarbg.to:2710/announce
- udp://exodus.desync.com:6969/announce
- udp://explodie.org:6969/announce
- udp://tracker.moeking.me:6969/announce
- udp://tracker.opentrackr.org:1337/announce
- udp://tracker.tiny-vps.com:6969/announce
- udp://ipv4.tracker.harry.lu:80/announce
- udp://tracker.coppersurfer.tk:6969/announce
- udp://tracker.leechers-paradise.org:6969/announce
- udp://open.stealth.si:80/announce
- udp://tracker.iamhansen.xyz:2000/announce