Python Ethical Hacking from Scratch
โ Scribed by Fahad Ali Sarwar
- Tongue
- English
- Leaves
- 301
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Table of Contents
Python Ethical Hacking from Scratch
Contributors
About the author
About the reviewers
Preface
Who this book is for
What this book covers
To get the most out of this book
Download the example code files
Download the color images
Conventions used
Get in touch
Reviews
Section 1: The Nuts and Bolts of Ethical Hacking โ The Basics
Chapter 1: Introduction to Hacking
What's all the fuss about hackers?
What is hacking?
Confidentiality
Integrity
Availability
Becoming a successful hacker
Legality
Types of hackers
White hat hackers
Black hat hackers
Gray hat hackers
Nation-state hackers
Corporate spies
Hacktivists
Script kiddies
Hacking phases and methodology
Planning
Reconnaissance
Scanning
Identifying weaknesses
Attacking and gaining access
Maintaining access
Post exploitation
Covering tracks
Reporting
Careers in cybersecurity
Systems security administration
Security architect
Penetration tester
Forensic analyst
Chief information security officer
Types of attacks
System control
Social engineering
Baiting
Phishing
Summary
Chapter 2: Getting Started โ Setting Up a Lab Environment
Technical requirements
Setting up VirtualBox
Installing virtual OSes
Attack machine OS
Installing Python
Installing Python on Windows
Installing Python on Kali Linux
Integrated development environment
Setting up networking
Updating Kali
Using virtual environments
Summary
Section 2: Thinking Like a Hacker โ Network Information Gathering and Attacks
Chapter 3: Reconnaissance and Information Gathering
What is a computer network?
Components of a basic computer network
Node
Server
Transmission media
Network interface card
Hub
Switch
Router
Gateway
Firewall
Classifying network
Local area network
Personal area network
Metropolitan area networks
Wide area network
Internet
Network stack
Introduction to OSI model
Complete cycle
TCP/IP model
Mapping the OSI and TCP/IP stack
Network entities
Private IP address
IPv4 versus IPv6
MAC address
Ports
Protection
Changing our MAC address
Creating a Python script
Summary
Chapter 4: Network Scanning
Introduction to networking
Data representation in digital systems
Data encapsulation
The packet delivery process
Introduction to Scapy
Installing Scapy
Understanding how Scapy works
Network scanner using Scapy
Address Resolution Protocol
ARP scanner using Scapy
Summary
Chapter 5: Man in the Middle Attacks
Why do we need ARP?
ARP poisoning
Building an ARP spoof program
Arp spoof project
Monitoring traffic
Encrypted traffic
Restoring ARP tables manually
Decrypting the network traffic
HTTPS versus HTTP
Bypassing HTTPS
Summary
Section 3: Malware Development
Chapter 6: Malware Development
Understanding RATs
Forward shell
Reverse shell
Socket programming in Python
Sockets
Creating a socket in Python
socket.socket() API
socket.bind() API
socket.listen() API
socket.accept() API
socket.connect()
socket.send()
Socket.recv()
socket.close()
Fitting it altogether
Creating malware
Hacker server
Victim's client
Running commands remotely on the victim's machine
Navigating directories
Summary
Chapter 7: Advanced Malware
Building a keylogger file transfer
Downloading the victim file to the hacker
Uploading files to the victim
Taking screenshots
Keylogger
Summary
Chapter 8: Post Exploitation
Packaging the malware
Understanding the pyinstaller library
Understanding trojans
Adding an icon to an executable
Creating your own trojan
Attack over a public IP
Cracking passwords
Stealing passwords
Creating botnets
Summary
Chapter 9: System Protection and Perseverance
Persistence system protection
Intrusion detection systems
IDS detection mechanisms
Bypassing an IDS
Persistence
Summary
Why subscribe?
Other Books You May Enjoy
Packt is searching for authors like you
Leave a review - let other readers know what you think
๐ SIMILAR VOLUMES
<p><b>Explore the world of practical ethical hacking by developing custom network scanning and remote access tools that will help you test the system security of your organization</b></p><h4>Key Features</h4><ul><li>Get hands-on with ethical hacking and learn to think like a real-life hacker</li><li
This book includes almost everything you need to start a job as a Python instructor. Learn how to make a password generator in Python with the ability to choose the length of each character type using the built-in random, string and argparse modules. Password generators are tools that allow the u
This book starts with the basics of ethical hacking, how to practice hacking safely and legally, and how to install and interact with Kali Linux and the Linux terminal. You will explore network hacking, where you will see how to test the security of wired and wireless networks. Youโll also learn how