Cargando…

Violent Python : a cookbook for hackers, forensic analysts, penetration testers and security engineers /

Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker's tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates h...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: O'Connor, T. J.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Rockland, MA : Elsevier Science, 2012.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBOOKCENTRAL_ocn818851447
003 OCoLC
005 20240329122006.0
006 m o d
007 cr unu||||||||
008 121124s2012 mau ob 001 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d OCLCQ  |d YDXCP  |d MDU  |d OCLCO  |d OCLCQ  |d UKDOC  |d OCLCF  |d OCLCQ  |d DEBSZ  |d AU@  |d OCLCQ  |d YDX  |d OCLCO  |d MERUC  |d OCLCQ  |d UUM  |d CUY  |d ZCU  |d ICG  |d OCLCQ  |d DKC  |d OCLCQ  |d COH  |d OCLCO  |d OCL  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL 
019 |a 880908188  |a 900687994  |a 958357674 
020 |a 9781597499644  |q (electronic bk.) 
020 |a 1597499641  |q (electronic bk.) 
020 |z 9781597499576  |q (pbk.) 
020 |z 1597499579  |q (pbk.) 
029 1 |a AU@  |b 000052915788 
029 1 |a DEBSZ  |b 43126256X 
029 1 |a DKDLA  |b 820120-katalog:999940615505765 
035 |a (OCoLC)818851447  |z (OCoLC)880908188  |z (OCoLC)900687994  |z (OCoLC)958357674 
050 4 |a QA76.73.P98 O26 2013eb 
082 0 4 |a 005.133 
049 |a UAMI 
100 1 |a O'Connor, T. J. 
245 1 0 |a Violent Python :  |b a cookbook for hackers, forensic analysts, penetration testers and security engineers /  |c TJ O'Conner. 
260 |a Rockland, MA :  |b Elsevier Science,  |c 2012. 
300 |a 1 online resource (289 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
505 0 |a Half Title; Title page; 1 Introduction; Introduction: A Penetration Test with Python; Setting Up Your Development Environment; Installing Third Party Libraries; Interpreted Python Versus Interactive Python; The Python Language; Variables; Strings; Lists; Dictionaries; Networking; Selection; Exception Handling; Functions; Iteration; File I/O; Sys Module; OS Module; Your First Python Programs; Setting the Stage for Your First Python Program: The Cuckoo's Egg; Your First Program, a UNIX Password Cracker; Setting the Stage for Your Second Program: Using Evil for Good. 
505 8 |a Your Second Program, a Zip-File Password CrackerChapter Wrap-Up; References; 2 Penetration Testing with Python; Introduction: The Morris Worm-Would it Work Today?; Building a Port Scanner; TCP Full Connect Scan; Application Banner Grabbing; Threading the Scan; Integrating the Nmap Port Scanner; Building an SSH BotNet with Python; Interacting with SSH Through Pexpect; Brute Forcing SSH Passwords with Pxssh; Exploiting SSH Through Weak Private Keys; Constructing the SSH Botnet; Mass Compromise by Bridging FTP and Web; Building an Anonymous FTP Scanner with Python. 
505 8 |a Using Ftplib to Brute Force FTP User CredentialsSearching for Web Pages on the FTP Server; Adding a Malicious Inject to Web Pages; Bringing the Entire Attack Together; Conficker, Why Trying Hard is Always Good Enough; Attacking the Windows SMB Service with Metasploit; Writing Python to Interact with Metasploit; Remote Process Execution Brute Force; Putting it Back Together to Build Our Own Conficker; Writing Your Own Zero-Day Proof of Concept Code; Stack-Based Buffer Overflow Attacks; Adding the Key Elements of the Attack; Sending the Exploit; Assembling the Entire Exploit Script. 
505 8 |a Chapter Wrap UpReferences; 3 Forensic Investigations with Python; Introduction: How Forensics Solved the BTK Murders; Where Have You Been?-Analysis of Wireless Access Points in the Registry; Using WinReg to Read the Windows Registry; Using Mechanize to Submit the MAC Address to Wigle; Using Python to Recover Deleted Items in the Recycle Bin; Using the OS Module to Find Deleted Items; Python to Correlate SID to User; Metadata; Using PyPDF to Parse PDF Metadata; Understanding Exif Metadata; Downloading Images with BeautifulSoup; Reading Exif Metadata from Images with the Python Imaging Library. 
505 8 |a Investigating Application Artifacts with PythonUnderstanding the Skype Sqlite3 Database; Using Python and Sqlite3 to Automate Skype Database Queries; Parsing Firefox Sqlite3 Databases with Python; Investigating iTunes Mobile Backups with Python; Chapter Wrap-Up; References; 4 Network Traffic Analysis with Python; Introduction: Operation Aurora and How the Obvious was Missed; Where is that IP Traffic Headed?-A Python Answer; Using PyGeoIP to Correlate IP to Physical Locations; Using Dpkt to Parse Packets; Using Python to Build a Google Map; Is Anonymous Really Anonymous? Analyzing LOIC Traffic. 
500 |a Using Dpkt to Find the LOIC Download. 
520 |a Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker's tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus. 
588 0 |a Print version record. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Python (Computer program language) 
650 0 |a Computer security. 
650 0 |a Wireless communication systems  |x Security measures. 
650 0 |a Computer crimes  |x Prevention. 
650 0 |a Computer crimes  |x Investigation. 
650 2 |a Computer Security 
650 6 |a Python (Langage de programmation) 
650 6 |a Sécurité informatique. 
650 6 |a Transmission sans fil  |x Sécurité  |x Mesures. 
650 6 |a Criminalité informatique  |x Enquêtes. 
650 7 |a Wireless communication systems  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Computer crimes  |x Prevention  |2 fast 
650 7 |a Computer crimes  |x Investigation  |2 fast 
650 7 |a Python (Computer program language)  |2 fast 
650 7 |a Python  |g Programmiersprache  |2 gnd 
758 |i has work:  |a Violent Python (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCFDFmv98JtXFWmbkJpDbbd  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a O'Connor, TJ.  |t Violent Python : A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers.  |d Rockland, MA : Elsevier Science, ©2012  |z 9781597499576 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1073021  |z Texto completo 
938 |a 123Library  |b 123L  |n 57539 
938 |a EBL - Ebook Library  |b EBLB  |n EBL1073021 
938 |a YBP Library Services  |b YANK  |n 9915537 
994 |a 92  |b IZTAP