𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Python Penetration Testing Essentials: Techniques for ethical hacking with Python

✍ Scribed by Raj, Mohit


Publisher
Packt Publishing
Year
2018
Tongue
English
Edition
2nd Edition
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book gives you the skills you need to use Python for penetration testing, with the help of detailed code examples. This book has been updated for Python 3.6.3 and Kali Linux 2018.1.;Cover; Title Page; Copyright and Credits; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Python with Penetration Testing and Networking; Introducing the scope of pentesting; The need for pentesting; Components to be tested; Qualities of a good pentester; Defining the scope of pentesting; Approaches to pentesting; Introducing Python scripting; Understanding the tests and tools you'll need; Learning the common testing platforms with Python; Network sockets; Server socket methods; Client socket methods; General socket methods; Moving on to the practical; Socket exceptions.

✦ Table of Contents


Cover
Title Page
Copyright and Credits
Packt Upsell
Contributors
Table of Contents
Preface
Chapter 1: Python with Penetration Testing and Networking
Introducing the scope of pentesting
The need for pentesting
Components to be tested
Qualities of a good pentester
Defining the scope of pentesting
Approaches to pentesting
Introducing Python scripting
Understanding the tests and tools you'll need
Learning the common testing platforms with Python
Network sockets
Server socket methods
Client socket methods
General socket methods
Moving on to the practical
Socket exceptions. Useful socket methodsSummary
Chapter 2: Scanning Pentesting
How to check live systems in a network and the concept of a live system
Ping sweep
The TCP scan concept and its implementation using a Python script
How to create an efficient IP scanner in Windows
How to create an efficient IP scanner in Linux
The concept of the Linux-based IP scanner
nmap with Python
What are the services running on the target machine?
The concept of a port scanner
How to create an efficient port scanner
Summary
Chapter 3: Sniffing and Penetration Testing
Introducing a network sniffer. Passive sniffingActive sniffing
Implementing a network sniffer using Python
Format characters
Learning about packet crafting
Introducing ARP spoofing and implementing it using Python
The ARP request
The ARP reply
The ARP cache
Testing the security system using custom packet crafting
A half-open scan
The FIN scan
ACK flag scanning
Summary
Chapter 4: Network Attacks and Prevention
Technical requirements
DHCP starvation attack
The MAC flooding attack
How the switch uses the CAM tables
The MAC flood logic
Gateway disassociation by RAW socket
Torrent detection. Running the program in hidden modeSummary
Chapter 5: Wireless Pentesting
Introduction to 802.11 frames
Wireless SSID finding and wireless traffic analysis with Python
Detecting clients of an AP
Wireless hidden SSID scanner
Wireless attacks
The deauthentication (deauth) attack
Detecting the deauth attack
Summary
Chapter 6: Honeypot --
Building Traps for Attackers
Technical requirements
Fake ARP reply
Fake ping reply
Fake port-scanning reply
Fake OS-signature reply to nmap
Fake web server reply
Summary
Chapter 7: Foot Printing a Web Server and a Web Application. The concept of foot printing a web serverIntroducing information gathering
Checking the HTTP header
Information gathering of a website from whois.domaintools.com
Email address gathering from a web page
Banner grabbing of a website
Hardening of a web server
Summary
Chapter 8: Client-Side and DDoS Attacks
Introducing client-side validation
Tampering with the client-side parameter with Python
Effects of parameter tampering on business
Introducing DoS and DDoS
Single IP, single ports
Single IP, multiple port
Multiple IP, multiple ports
Detection of DDoS
Summary.

✦ Subjects


Computer security;Computers--Networking--Security;Computers--Programming Languages--Python;Computers--Security--General;Network security;Penetration testing;Programming & scripting languages: general;Python;Electronic books;Computers -- Networking -- Security;Computers -- Security -- General;Computers -- Programming Languages -- Python


πŸ“œ SIMILAR VOLUMES


Hacking with Python: Beginner's Guide to
✍ Lane, Evan πŸ“‚ Library πŸ“… 2017 🌐 English

Hacking and Python Made Easy!The world of hacking is an interesting study. It allows you the opportunity to learn more about your computer system, work with different programs, and even protects your computer and your network against black hat hackers.There are many different attacks that a hacker c

Python Penetration Testing Essentials
✍ Mohit πŸ“‚ Library πŸ“… 2015 πŸ› Packt Pub Limited 🌐 English

If you are a Python programmer or a security researcher who has basic knowledge of Python programming and want to learn about penetration testing with the help of Python, this book is ideal for you. Even if you are new to the field of ethical hacking, this book can help you find the vulnerabilities

Python Penetration Testing Essentials
✍ Mohit πŸ“‚ Library πŸ“… 2018 πŸ› Packt Publishing 🌐 English

This book gives you the skills you need to use Python for penetration testing, with the help of detailed code examples. This book has been updated for Python 3.6.3 and Kali Linux 2018.1. About This Book Detect and avoid various attack types that put the privacy of a system at risk Leverage Python to

Python Penetration Testing Essentials
✍ Mohit Raj. πŸ“‚ Library 🌐 English

EPUB. +Π€Π°ΠΉΠ»Ρ‹ ΠΏΡ€ΠΈΠΌΠ΅Ρ€ΠΎΠ². Π―Π·Ρ‹ΠΊ Π°Π½Π³Π».<br/>Packt Publishing, 2015. - 178p.<div class="bb-sep"></div>Employ the power of Python to get the best out of pentesting.<div class="bb-sep"></div>This book is a practical guide that shows you the advantages of using Python for pentesting with the help of detailed