Cargando…

Python Penetration Testing Essentials : Techniques for ethical hacking with Python, 2nd Edition.

This book gives you the skills you need to use Python for penetration testing, with the help of detailed code examples. This book has been updated for Python 3.6.3 and Kali Linux 2018.1.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Raj, Mohit
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Publishing, 2018.
Edición:2nd ed.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Cover; Title Page; Copyright and Credits; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Python with Penetration Testing and Networking; Introducing the scope of pentesting; The need for pentesting; Components to be tested; Qualities of a good pentester; Defining the scope of pentesting; Approaches to pentesting; Introducing Python scripting; Understanding the tests and tools you'll need; Learning the common testing platforms with Python; Network sockets; Server socket methods; Client socket methods; General socket methods; Moving on to the practical; Socket exceptions.
  • Useful socket methodsSummary; Chapter 2: Scanning Pentesting; How to check live systems in a network and the concept of a live system; Ping sweep; The TCP scan concept and its implementation using a Python script; How to create an efficient IP scanner in Windows; How to create an efficient IP scanner in Linux; The concept of the Linux-based IP scanner; nmap with Python; What are the services running on the target machine?; The concept of a port scanner; How to create an efficient port scanner; Summary; Chapter 3: Sniffing and Penetration Testing; Introducing a network sniffer.
  • Passive sniffingActive sniffing; Implementing a network sniffer using Python; Format characters; Learning about packet crafting; Introducing ARP spoofing and implementing it using Python; The ARP request; The ARP reply; The ARP cache; Testing the security system using custom packet crafting ; A half-open scan; The FIN scan; ACK flag scanning; Summary; Chapter 4: Network Attacks and Prevention; Technical requirements; DHCP starvation attack; The MAC flooding attack; How the switch uses the CAM tables; The MAC flood logic; Gateway disassociation by RAW socket; Torrent detection.
  • Running the program in hidden modeSummary; Chapter 5: Wireless Pentesting; Introduction to 802.11 frames; Wireless SSID finding and wireless traffic analysis with Python; Detecting clients of an AP; Wireless hidden SSID scanner; Wireless attacks; The deauthentication (deauth) attack; Detecting the deauth attack; Summary; Chapter 6: Honeypot
  • Building Traps for Attackers; Technical requirements; Fake ARP reply; Fake ping reply; Fake port-scanning reply; Fake OS-signature reply to nmap; Fake web server reply; Summary ; Chapter 7: Foot Printing a Web Server and a Web Application.
  • The concept of foot printing a web serverIntroducing information gathering; Checking the HTTP header; Information gathering of a website from whois.domaintools.com ; Email address gathering from a web page; Banner grabbing of a website; Hardening of a web server; Summary; Chapter 8: Client-Side and DDoS Attacks; Introducing client-side validation; Tampering with the client-side parameter with Python; Effects of parameter tampering on business; Introducing DoS and DDoS; Single IP, single ports; Single IP, multiple port; Multiple IP, multiple ports; Detection of DDoS; Summary.