Practical Ethical Hacking with Python: Develop your own ethical hacking tools using Python
โ Scribed by Tony Snake
- Publisher
- Independently published
- Year
- 2022
- Tongue
- English
- Leaves
- 245
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
This book includes almost everything you need to start a job as a Python instructor.
Learn how to make a password generator in Python with the ability to choose the length of each character type using the built-in random, string and argparse modules. Password generators are tools that allow the user to create random and customized strong passwords based on preferences. In this tutorial, we will make a command-line tool in Python for generating passwords. We will use the argparse module to make it easier to parse the command line arguments the user has provided.
Learn how you can make a DHCP listener by sniffing DHCP packets in the network using the Scapy library in Python. Dynamic Host Configuration Protocol (DHCP) is a network protocol that provides clients connected to a network to obtain TCP/IP configuration information (such as the private IP address) from a DHCP server. A DHCP server (can be an access point, router, or configured in a server) dynamically assigns an IP address and other configuration parameters to each device connected to the network. The DHCP protocol uses User Datagram Protocol (UDP) to perform the communication between the server and clients. It is implemented with two port numbers: UDP port number 67 for the server and UDP port number 68 for the client. In this tutorial, we will make a simple DHCP listener using the Scapy library in Python. In other words, we'll be able to listen for DHCP packets in the network and extract valuable information whenever a device connects to the network we're in.
โฆ Table of Contents
- Make a Password Generator in Python
- Make a DHCP Listener using Scapy in Python
- Inject Code into HTTP Responses in the Network in Python
- MAC Address Changer
- Extract Saved WiFi Passwords
- Extract Chrome Cookies
- HTTP Proxy
- Shodan API
- Extract Chrome Passwords
- SYN Flooding Attack
- SQL Injection Scanner
- Crack PDF Files
- Brute Force ZIP File Passwords
- WiFi Scanner
- XSS Vulnerability Scanner
- Brute-Force SSH Servers
- Hide Data in Images
- Subdomain Scanner
- Extract All Website Links
- Encrypt and Decrypt Files
- Reverse Shell
- Sniff HTTP Packets
- Disconnect Devices from Wi-Fi
- DNS Spoof attack
- Make a Keylogger
- Detect ARP Spoof Attack
- Build an ARP Spoofer
- Make a Network Scanner
๐ SIMILAR VOLUMES
Dive into the world of cybersecurity with "Ethical Hacking with Python: Developing Cybersecurity Tools," a comprehensive guide designed to elevate your skills in protecting digital assets against ever-evolving threats. This book meticulously unfolds the landscape of ethical hacking and the pivotal r
Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set you up with a foundation that will help you understand the advanced concepts of hacking in the future. Learn Ethical Hacking with Python 3 touches the core issues of cyber secur
<div><p>Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set you up with a foundation that will help you understand the advanced concepts of hacking in the future. <em>Learn Ethical Hacking with Python 3</em> touches the core issu
<p><p>Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set you up with a foundation that will help you understand the advanced concepts of hacking in the future. <em>Learn Ethical Hacking with Python 3</em> touches the core issues
This book gives you the skills you need to use Python for penetration testing, with the help of detailed code examples. This book has been updated for Python 3.6.3 and Kali Linux 2018.1.;Cover; Title Page; Copyright and Credits; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Pyth