Python penetration testing essentials: employ the power of Python to get the best out of pentesting
โ Scribed by Mohit
- Publisher
- Packt Publishing - ebooks Account
- Year
- 2015
- Tongue
- English
- Leaves
- 178
- Series
- Community experience distilled
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
This book is a practical guide that shows you the advantages of using Python for pentesting with the help of detailed code examples.We start by exploring the basics of networking with Python and then proceed to network hacking. Next, we delve into hacking the application layer where we start with gathering information from a website. We then move on to concepts related to website hacking such as parameter tampering, DDoS, XSS, and SQL injection.By reading this book, you will learn different techniques and methodologies that will familiarize you with the art of pentesting as well as creating automated programs to find the admin console, SQL injection, and XSS attack.
โฆ Table of Contents
Cover......Page 1
Copyright......Page 3
Credits......Page 4
About the Author......Page 5
About the Reviewers......Page 6
www.PacktPub.com......Page 8
Table of Contents......Page 10
Preface......Page 14
Chapter 1: Python with Penetration Testing and Networking......Page 18
The need for pentesting......Page 19
Qualities of a good pentester......Page 20
Approaches to pentesting......Page 21
Introducing Python scripting......Page 22
Network sockets......Page 23
Server socket methods......Page 24
General socket methods......Page 25
Moving on to the practical......Page 26
Socket exceptions......Page 33
Useful socket methods......Page 35
Summary......Page 40
Chapter 2: Scanning Pentesting......Page 42
Ping sweep......Page 43
The TCP scan concept and its implementation using a Python script......Page 47
How to create an efficient IP scanner......Page 50
The concept of a port scanner......Page 57
How to create an efficient port scanner......Page 60
Summary......Page 69
Chapter 3: Sniffing and Penetration Testing......Page 70
Implementing a network sniffer using Python......Page 71
Format characters......Page 73
Introducing ARP spoofing and implementing it using Python......Page 83
The ARP cache......Page 84
Network disassociation......Page 88
A half-open scan......Page 89
The FIN scan......Page 93
ACK flag scanning......Page 95
Ping of death......Page 96
Summary......Page 97
Chapter 4: Wireless Pentesting......Page 98
Wireless SSID finding and wireless traffic analysis by Python......Page 101
Detecting clients of an AP......Page 108
The deauthentication (deauth) attacks......Page 109
How the switch uses the CAM tables......Page 111
The MAC flood logic......Page 113
Summary......Page 114
The concept of foot printing of a web server......Page 116
Introducing information gathering......Page 117
Checking the HTTP header......Page 120
Information gathering of a website from SmartWhois by the parser BeautifulSoup......Page 122
Banner grabbing of a website......Page 127
Hardening of a web server......Page 129
Summary......Page 130
Introducing client-side validation......Page 132
Tampering with the client-side parameter with Python......Page 133
Effects of parameter tampering on business......Page 138
Single IP single port......Page 140
Single IP multiple port......Page 142
Multiple IP multiple port......Page 143
Detection of DDoS......Page 145
Summary......Page 147
Chapter 7: Pentesting of SQLI and XSS......Page 148
Types of SQL injections......Page 149
Understanding the SQL injection attack by a Python script......Page 150
Nonpersistent or reflected XSS......Page 161
Summary......Page 170
Index......Page 172
โฆ Subjects
Nonfiction;Computer Science;Programming
๐ SIMILAR VOLUMES
This book is a practical guide that shows you the advantages of using Python for pentesting with the help of detailed code examples.We start by exploring the basics of networking with Python and then proceed to network hacking. Next, we delve into hacking the application layer where we start with ga
This book is a practical guide that shows you the advantages of using Python for pentesting with the help of detailed code examples. We start by exploring the basics of networking with Python and then proceed to network hacking. Next, we delve into hacking the application layer where we start with
If you are a Python programmer or a security researcher who has basic knowledge of Python programming and want to learn about penetration testing with the help of Python, this book is ideal for you. Even if you are new to the field of ethical hacking, this book can help you find the vulnerabilities
This book gives you the skills you need to use Python for penetration testing, with the help of detailed code examples. This book has been updated for Python 3.6.3 and Kali Linux 2018.1. About This Book Detect and avoid various attack types that put the privacy of a system at risk Leverage Python to