000 | 06652nam a22004573i 4500 | ||
---|---|---|---|
001 | EBC5165110 | ||
003 | MiAaPQ | ||
005 | 20240729131635.0 | ||
006 | m o d | | ||
007 | cr cnu|||||||| | ||
008 | 240724s2017 xx o ||||0 eng d | ||
020 |
_a9781784394097 _q(electronic bk.) |
||
035 | _a(MiAaPQ)EBC5165110 | ||
035 | _a(Au-PeEL)EBL5165110 | ||
035 | _a(CaPaEBR)ebr11475308 | ||
035 | _a(OCoLC)1014431979 | ||
040 |
_aMiAaPQ _beng _erda _epn _cMiAaPQ _dMiAaPQ |
||
050 | 4 | _aQA76.73.P98 .R445 2017 | |
082 | 0 | _a005.133 | |
100 | 1 | _aRehim, Rejah. | |
245 | 1 | 0 |
_aPython Penetration Testing Cookbook : _bOver 50+ Hands-On Recipes to Help You Pen Test Networks Using Python, Discover Vulnerabilities, and Find a Recovery Path. |
250 | _a1st ed. | ||
264 | 1 |
_aBirmingham : _bPackt Publishing, Limited, _c2017. |
|
264 | 4 | _c©2016. | |
300 | _a1 online resource (216 pages) | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
505 | 0 | _aIntro -- Title Page -- Copyright -- Credits -- About the Author -- About the Reviewers -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Why Python in Penetration Testing? -- Introduction -- Why Python is a great option for security scripting -- Getting ready -- How to do it... -- Python can be used in both and interpreted and compiled forms -- Syntax and indented layout -- Simple learning curve -- Powerful third-party libraries -- Cross-platform (code anywhere) -- Python 3 language basics and differences -- Getting ready -- How to do it... -- Python 2 -- Python 3 -- Python 2.7 -- Key differences between Python 2.7 and Python 3 -- Chapter 2: Setting Up a Python Environment -- Introduction -- Setting up a Python environment in Linux -- Getting ready -- How to do it... -- Installing Python -- Setting up a virtual environment -- Setting up the editor or IDE -- Setting up a Python environment in macOS -- Getting ready -- How to do it... -- Installing Python -- Setting up a Python environment in Windows -- How to do it... -- Chapter 3: Web Scraping with Python -- Introduction -- Download web pages with Python scripts -- Getting ready -- How to do it... -- With Python 2 -- With Python 3 -- Changing the user agent -- How to do it... -- Downloading files -- Getting ready -- How to do it... -- Using a regular expression to get the information from the downloaded web pages -- How to do it... -- Requesting and downloading dynamic website pages -- Escaping invalid characters -- How to do it... -- Dynamic GET requests -- How to do it... -- Chapter 4: Data Parsing with Python -- Introduction -- Parsing HTML tables -- Getting ready -- How to do it... -- Extracting data from HTML documents -- Getting ready -- How to do it... -- Parsing XML data -- Getting ready -- How to do it. | |
505 | 8 | _aChapter 5: Web Scraping with Scrapy and BeautifulSoup -- Introduction -- Web spiders with Scrapy -- Getting ready -- How to do it... -- Scrapy shell -- How to do it... -- Link extractor with Scrapy -- How to do it... -- Scraping after logging into websites using Scrapy -- Getting ready -- How to do it... -- Chapter 6: Network Scanning with Python -- Introduction -- Simple port scanner -- Getting ready -- How to do it... -- IP range/network scanner -- Getting ready -- How to do it... -- Stealth scanning -- Getting ready -- How to do it... -- FIN scanning -- How to do it... -- XMAS scanning -- How to do it... -- TCP ACK scanning -- How to do it... -- LanScan -- Getting ready -- How to do it... -- Chapter 7: Network Sniffing with Python -- Introduction -- Packet sniffer in Python -- Getting ready -- How to do it... -- Parsing the packet -- How to do it... -- PyShark -- Getting ready -- How to do it... -- Chapter 8: Scapy Basics -- Introduction -- Creating a packet with Scapy -- Getting ready -- How to do it... -- Sending and receiving packets with Scapy -- How to do it... -- Layering packets -- How to do it... -- Reading and writing to pcap files -- How to do it... -- Sniffing packets -- How to do it... -- ARP man-in-the-middle tool with Scapy -- How to do it... -- Chapter 9: Wi-Fi Sniffing -- Introduction -- Finding Wi-Fi devices -- Getting ready -- How to do it... -- Linux -- macOS -- Finding SSIDs -- How to do it... -- Exposing hidden SSIDs -- How to do it... -- Dictionary attack on hidden SSIDs -- How to do it... -- Fake access points with Scapy -- How to do it... -- Chapter 10: Layer 2 Attacks -- Introduction -- ARP Watcher -- How to do it... -- ARP cache poisoning -- Getting ready -- Linux -- macOS -- How to do it... -- MAC flooder -- How to do it... -- VLAN hopping -- How to do it... -- ARP spoofing over VLAN hopping -- How to do it. | |
505 | 8 | _aDHCP starvation -- How to do it... -- Chapter 11: TCP/IP Attacks -- Introduction -- IP spoofing -- How to do it... -- SYN flooding -- How to do it... -- Password sniffer with Python over LAN -- How to do it... -- Chapter 12: Introduction to Exploit Development -- Introduction -- CPU registers -- Getting ready -- General purpose registers -- Special purpose registers -- How to do it... -- Memory dump -- How to do it... -- CPU instructions -- How to do it... -- Chapter 13: Windows Exploit Development -- Introduction -- Windows memory layout -- Getting ready -- The stack -- The heap -- Program image and dynamic link libraries -- Process Environment Block (PEB) -- Thread Environment Block (TEB) -- How to do it... -- Buffer overflow with saved return pointer overwrite -- Getting ready -- Installing Mona -- How to do it... -- Structured Exception Handling -- Getting ready -- How to do it... -- Egg hunters -- Getting ready -- How to do it... -- Chapter 14: Linux Exploit Development -- Introduction -- Format string exploitation -- Getting ready -- Global offset table -- Generating shell code -- How to do it... -- Buffer overflow -- How to do it... -- Index. | |
588 | _aDescription based on publisher supplied metadata and other sources. | ||
590 | _aElectronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries. | ||
650 | 0 | _aPython (Computer program language). | |
650 | 0 | _aProgramming languages (Computers). | |
655 | 4 | _aElectronic books. | |
700 | 1 | _aMohit. | |
776 | 0 | 8 |
_iPrint version: _aRehim, Rejah _tPython Penetration Testing Cookbook _dBirmingham : Packt Publishing, Limited,c2017 |
797 | 2 | _aProQuest (Firm) | |
856 | 4 | 0 |
_uhttps://ebookcentral.proquest.com/lib/orpp/detail.action?docID=5165110 _zClick to View |
999 |
_c133752 _d133752 |