Skip to Content
Mastering Python for Networking and Security
book

Mastering Python for Networking and Security

by José Manuel Ortega
September 2018
Intermediate to advanced
426 pages
10h 46m
English
Packt Publishing
Content preview from Mastering Python for Networking and Security

Introduction to exploiting

The exploitation phase is the process of gaining control over a system. This process can take many different forms, but the ultimate goal is always the same: to obtain administrative-level access to the attacked computer.

Exploitation is the phase of the most free execution, since each system is different and unique. Depending on the scenario, attack vectors vary from one target to another, since different operating systems, different services, and different processes require different types of attacks. Skilled attackers must understand the nuances of each system they intend to exploit and, eventually, they will be able to perform their own exploits.

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Mastering Python for Networking and Security - Second Edition

Mastering Python for Networking and Security - Second Edition

José Manuel Ortega
Python for Cybersecurity

Python for Cybersecurity

Howard E. Poston, III

Publisher Resources

ISBN: 9781788992510Supplemental Content