Python for Cybersecurity: Using Python for Cyber Offense and Defense
Python for Cybersecurity: Using Python for Cybersecurity provides a visual and practical explanation of using Python for cybersecurity. It relies on the MITER ATT&CK framework to identify the structure of cyberattack techniques, attack defense, and key cybersecurity challenges faced by network administrators and other stakeholders today.
This book is written to help you use Python in a variety of cybersecurity situations, including:
- Identify, Develop Resources, Initial Access and Implementation
- Continuity, Escalation of Privileges, Evasion of Defense, and Access to Credibility
- Reconnaissance, lateral movement, collection, and command and control
- Influence and influence
Each chapter includes discussions of several techniques and lateral techniques that can be used to achieve the attacker’s goals in each of these cases. An ideal resource for anyone with a professional or personal interest in cybersecurity, Python For Cybersecurity provides in-depth information on a wide range of effective Python-based attacks and defenses against them.
Headlines:
Chapter 1 Fulfilling Pre-ATT&CK Objectives
Chapter 2 Gaining Initial Access
Chapter 3 Achieving Code Execution
Chapter 4 Maintaining Persistence
Chapter 5 Performing Privilege Escalation
Chapter 6 Evading Defenses
Chapter 7 Accessing Credentials
Chapter 8 Performing Discovery
Chapter 9 Moving Laterally
Chapter 10 Collecting Intelligence
Chapter 11 Implementing Command and Control
Chapter 12 Exfiltrating Data
Chapter 13 Achieving Impact
Specifications:
Authors: Howard E. Poston
Publisher: Wiley
Year of release: 2022
Number of Pages: 240
File size: 1.99MB
- Rating