Loading [MathJax]/extensions/MathMenu.js
Pentest Automation with Python | part of Kali Linux Penetration Testing Bible | Wiley Data and Cybersecurity books | IEEE Xplore

Pentest Automation with Python


Chapter Abstract:

This chapter focuses on how to take a simple idea and then implement it in Python. It explores how to take an automation idea and use it as a penetration tester. The chap...Show More

Chapter Abstract:

This chapter focuses on how to take a simple idea and then implement it in Python. It explores how to take an automation idea and use it as a penetration tester. The chapter provides application workflow. Successful developers often design their application before they start coding. A code refactoring methodology will make sure to avoid programming terrible practices. Programmers talk about this every day, so they develop clean source code. The user will input either a single IP address or a range in the CIDR format. For quality assurance, let's test the three scenario cases: a single IP address input, a valid CIDR range input, and an invalid CIDR range input.
Page(s): 411 - 426
Copyright Year: 2021
Edition: 1
ISBN Information:

Contact IEEE to Subscribe