Python Penetration Testing Cookbook : Over 50+ Hands-On Recipes to Help You Pen Test Networks Using Python, Discover Vulnerabilities, and Find a Recovery Path.
Material type:
- text
- computer
- online resource
- 9781784394097
- 005.133
- QA76.73.P98 .R445 2017
Intro -- Title Page -- Copyright -- Credits -- About the Author -- About the Reviewers -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Why Python in Penetration Testing? -- Introduction -- Why Python is a great option for security scripting -- Getting ready -- How to do it... -- Python can be used in both and interpreted and compiled forms -- Syntax and indented layout -- Simple learning curve -- Powerful third-party libraries -- Cross-platform (code anywhere) -- Python 3 language basics and differences -- Getting ready -- How to do it... -- Python 2 -- Python 3 -- Python 2.7 -- Key differences between Python 2.7 and Python 3 -- Chapter 2: Setting Up a Python Environment -- Introduction -- Setting up a Python environment in Linux -- Getting ready -- How to do it... -- Installing Python -- Setting up a virtual environment -- Setting up the editor or IDE -- Setting up a Python environment in macOS -- Getting ready -- How to do it... -- Installing Python -- Setting up a Python environment in Windows -- How to do it... -- Chapter 3: Web Scraping with Python -- Introduction -- Download web pages with Python scripts -- Getting ready -- How to do it... -- With Python 2 -- With Python 3 -- Changing the user agent -- How to do it... -- Downloading files -- Getting ready -- How to do it... -- Using a regular expression to get the information from the downloaded web pages -- How to do it... -- Requesting and downloading dynamic website pages -- Escaping invalid characters -- How to do it... -- Dynamic GET requests -- How to do it... -- Chapter 4: Data Parsing with Python -- Introduction -- Parsing HTML tables -- Getting ready -- How to do it... -- Extracting data from HTML documents -- Getting ready -- How to do it... -- Parsing XML data -- Getting ready -- How to do it.
Chapter 5: Web Scraping with Scrapy and BeautifulSoup -- Introduction -- Web spiders with Scrapy -- Getting ready -- How to do it... -- Scrapy shell -- How to do it... -- Link extractor with Scrapy -- How to do it... -- Scraping after logging into websites using Scrapy -- Getting ready -- How to do it... -- Chapter 6: Network Scanning with Python -- Introduction -- Simple port scanner -- Getting ready -- How to do it... -- IP range/network scanner -- Getting ready -- How to do it... -- Stealth scanning -- Getting ready -- How to do it... -- FIN scanning -- How to do it... -- XMAS scanning -- How to do it... -- TCP ACK scanning -- How to do it... -- LanScan -- Getting ready -- How to do it... -- Chapter 7: Network Sniffing with Python -- Introduction -- Packet sniffer in Python -- Getting ready -- How to do it... -- Parsing the packet -- How to do it... -- PyShark -- Getting ready -- How to do it... -- Chapter 8: Scapy Basics -- Introduction -- Creating a packet with Scapy -- Getting ready -- How to do it... -- Sending and receiving packets with Scapy -- How to do it... -- Layering packets -- How to do it... -- Reading and writing to pcap files -- How to do it... -- Sniffing packets -- How to do it... -- ARP man-in-the-middle tool with Scapy -- How to do it... -- Chapter 9: Wi-Fi Sniffing -- Introduction -- Finding Wi-Fi devices -- Getting ready -- How to do it... -- Linux -- macOS -- Finding SSIDs -- How to do it... -- Exposing hidden SSIDs -- How to do it... -- Dictionary attack on hidden SSIDs -- How to do it... -- Fake access points with Scapy -- How to do it... -- Chapter 10: Layer 2 Attacks -- Introduction -- ARP Watcher -- How to do it... -- ARP cache poisoning -- Getting ready -- Linux -- macOS -- How to do it... -- MAC flooder -- How to do it... -- VLAN hopping -- How to do it... -- ARP spoofing over VLAN hopping -- How to do it.
DHCP starvation -- How to do it... -- Chapter 11: TCP/IP Attacks -- Introduction -- IP spoofing -- How to do it... -- SYN flooding -- How to do it... -- Password sniffer with Python over LAN -- How to do it... -- Chapter 12: Introduction to Exploit Development -- Introduction -- CPU registers -- Getting ready -- General purpose registers -- Special purpose registers -- How to do it... -- Memory dump -- How to do it... -- CPU instructions -- How to do it... -- Chapter 13: Windows Exploit Development -- Introduction -- Windows memory layout -- Getting ready -- The stack -- The heap -- Program image and dynamic link libraries -- Process Environment Block (PEB) -- Thread Environment Block (TEB) -- How to do it... -- Buffer overflow with saved return pointer overwrite -- Getting ready -- Installing Mona -- How to do it... -- Structured Exception Handling -- Getting ready -- How to do it... -- Egg hunters -- Getting ready -- How to do it... -- Chapter 14: Linux Exploit Development -- Introduction -- Format string exploitation -- Getting ready -- Global offset table -- Generating shell code -- How to do it... -- Buffer overflow -- How to do it... -- Index.
Description based on publisher supplied metadata and other sources.
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
There are no comments on this title.