Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set you up with a foundation that will help you understand the advanced concepts of hacking in the future. Learn Ethical Hacking with Python 3 touches the core issues of cyber secur
Beginning Ethical Hacking with Python
β Scribed by Sanjib Sinha (auth.)
- Publisher
- Apress
- Year
- 2017
- Tongue
- English
- Leaves
- 197
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set you up with a foundation that will help you understand the advanced concepts of hacking in the future. Learn Ethical Hacking with Python 3 touches the core issues of cyber security: in the modern world of interconnected computers and the Internet, security is increasingly becoming one of the most important features of programming.
Ethical hacking is closely related to Python. For this reason this book is organized in three parts. The first part deals with the basics of ethical hacking; the second part deals with Python 3; and the third part deals with more advanced features of ethical hacking.
What You Will Learn
- Discover the legal constraints of ethical hacking
- Work with virtual machines and virtualization
- Develop skills in Python 3
- See the importance of networking in ethical hacking
- Gain knowledge of the dark web, hidden Wikipedia, proxy chains, virtual private networks, MAC addresses, and more
Who This Book Is For
Beginners wanting to learn ethical hacking alongside a modular object oriented programming language.
β¦ Table of Contents
Front Matter....Pages i-xix
Front Matter....Pages 1-1
Legal Side of Hacking....Pages 3-3
Hacking Environment....Pages 5-8
Installing Virtual Box....Pages 9-11
Installing Kali Linux and Other Operating Systems on VB....Pages 13-19
Linux Terminal, Basic Commands....Pages 21-33
Front Matter....Pages 35-35
Python 3 and Ethical Hacking....Pages 37-38
Python Environment....Pages 39-41
General Syntaxes....Pages 43-47
Variables, Objects and Values....Pages 49-66
Conditionals....Pages 67-68
Loops....Pages 69-73
Regular Expressions....Pages 75-80
Exceptions, Catching Errors....Pages 81-83
Functions....Pages 85-95
Classes....Pages 97-120
String Methods....Pages 121-126
File Input And Output....Pages 127-128
Containers....Pages 129-136
Database....Pages 137-147
Module....Pages 149-152
Front Matter....Pages 35-35
Debugging, Unittest Module....Pages 153-156
Socket and Networking....Pages 157-157
Importing Nmap Module....Pages 159-163
Building an Nmap Network Scanner....Pages 165-168
Front Matter....Pages 169-169
Protect Anonymity on the Internet....Pages 171-171
Dark Web and Tor....Pages 173-177
Proxy Chains....Pages 179-183
Virtual Private Network or VPN....Pages 185-189
MAC Address....Pages 191-194
Back Matter....Pages 195-201
β¦ Subjects
Python;Security;Systems and Data Security;Data Encryption
π SIMILAR VOLUMES
<div><p>Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set you up with a foundation that will help you understand the advanced concepts of hacking in the future. <em>Learn Ethical Hacking with Python 3</em> touches the core issu
Hacking and Python Made Easy!The world of hacking is an interesting study. It allows you the opportunity to learn more about your computer system, work with different programs, and even protects your computer and your network against black hat hackers.There are many different attacks that a hacker c
This book includes almost everything you need to start a job as a Python instructor. Learn how to make a password generator in Python with the ability to choose the length of each character type using the built-in random, string and argparse modules. Password generators are tools that allow the u
Dive into the world of cybersecurity with "Ethical Hacking with Python: Developing Cybersecurity Tools," a comprehensive guide designed to elevate your skills in protecting digital assets against ever-evolving threats. This book meticulously unfolds the landscape of ethical hacking and the pivotal r
Hacking. In the digital age the word conjures up images of individuals in darkened basements, breaking into multi-national companyβs computer systems, leaking sensitive information and living on takeaways β never seeing the light of day. But reality is very different and there are many, who are novi