Understanding Network Hacks Attack and Defense with Python

Understanding Network Hacks Attack and Defense with Python

Author
Ballmann, Bastian
Publisher
Springer
Language
English
Edition
1st ed.
Year
2015
Page
XIV, 178 Seiten in 1 Teil 26 Illustrationen 23.5 x 16 cm, 0 g
ISBN
9783662444368,9783662444375,9783662508626,3662508621
File Type
pdf
File Size
1.6 MiB

About the Author Bastian Ballmann is a professional programmer, system engineer and member of the Chaos Computer Club since 2002. He holds lectures on network hijacking attacks as well as Bluetooth hacking and is the author of various security related tools like P.A.T.H., Blue diving and Chaosmap. In his free time he also writes the German Datenterrorist Blog and produced the podcasts Freibyte and Gesprächssituation about computer and security related stuff. Product Description This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore the reader will be introduced to defense methods such as intrusion detection and prevention systems and log file analysis by diving into code. Review “This book offers a set of tools written in the Python programming language that can be used to test network vulnerabilities. … This book would be of value to those who are interested in network security and penetration testing at the code level. … And if one has the necessary background, the book can be very useful to take this knowledge to a deeper level in the nuts and bolts of how this stuff really works.” (J. M. Artz, Computing Reviews, August, 2015) From the Back Cover This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore the reader will be introduced to defense methods such as intrusion detection and prevention systems and log file analysis by diving into code.

show more...

How to Download?!!!

Just click on START button on Telegram Bot

Free Download Book