舉報

會員
Python Penetration Testing Cookbook
最新章節:
How to do it...
IfyouareadeveloperwithpriorknowledgeofusingPythonforpenetrationtestingandifyouwantanoverviewofscriptingtaskstoconsiderwhilepenetrationtesting,thisbookwillgiveyoualotofusefulcodeforyourtoolkit.
目錄(221章)
倒序
- 封面
- 版權信息
- Credits
- About the Author
- About the Reviewers
- www.PacktPub.com
- Why subscribe?
- Customer Feedback
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Sections
- Getting ready
- How to do it…
- Conventions
- Reader feedback
- Customer support
- Downloading the example code
- Downloading the color images of this book
- Errata
- Piracy
- Questions
- Why Python in Penetration Testing?
- Introduction
- Why Python is a great option for security scripting
- Getting ready
- How to do it...
- Python can be used in both and interpreted and compiled forms
- Syntax and indented layout
- Simple learning curve
- Powerful third-party libraries
- Cross-platform (code anywhere)
- Python 3 language basics and differences
- Getting ready
- How to do it...
- Python 2
- Python 3
- Python 2.7
- Key differences between Python 2.7 and Python 3
- Setting Up a Python Environment
- Introduction
- Setting up a Python environment in Linux
- Getting ready
- How to do it...
- Installing Python
- Setting up a virtual environment
- Setting up the editor or IDE
- Setting up a Python environment in macOS
- Getting ready
- How to do it...
- Installing Python
- Setting up a Python environment in Windows
- How to do it...
- Web Scraping with Python
- Introduction
- Download web pages with Python scripts
- Getting ready
- How to do it...
- With Python 2
- With Python 3
- Changing the user agent
- How to do it...
- Downloading files
- Getting ready
- How to do it...
- Using a regular expression to get the information from the downloaded web pages
- How to do it...
- Requesting and downloading dynamic website pages
- Escaping invalid characters
- How to do it...
- Dynamic GET requests
- How to do it...
- Data Parsing with Python
- Introduction
- Parsing HTML tables
- Getting ready
- How to do it...
- Extracting data from HTML documents
- Getting ready
- How to do it...
- Parsing XML data
- Getting ready
- How to do it...
- Web Scraping with Scrapy and BeautifulSoup
- Introduction
- Web spiders with Scrapy
- Getting ready
- How to do it...
- Scrapy shell
- How to do it...
- Link extractor with Scrapy
- How to do it...
- Scraping after logging into websites using Scrapy
- Getting ready
- How to do it...
- Network Scanning with Python
- Introduction
- Simple port scanner
- Getting ready
- How to do it...
- IP range/network scanner
- Getting ready
- How to do it...
- Stealth scanning
- Getting ready
- How to do it...
- FIN scanning
- How to do it...
- XMAS scanning
- How to do it...
- TCP ACK scanning
- How to do it...
- LanScan
- Getting ready
- How to do it...
- Network Sniffing with Python
- Introduction
- Packet sniffer in Python
- Getting ready
- How to do it...
- Parsing the packet
- How to do it...
- PyShark
- Getting ready
- How to do it...
- Scapy Basics
- Introduction
- Creating a packet with Scapy
- Getting ready
- How to do it...
- Sending and receiving packets with Scapy
- How to do it...
- Layering packets
- How to do it...
- Reading and writing to pcap files
- How to do it...
- Sniffing packets
- How to do it...
- ARP man-in-the-middle tool with Scapy
- How to do it...
- Wi-Fi Sniffing
- Introduction
- Finding Wi-Fi devices
- Getting ready
- How to do it...
- Linux
- macOS
- Finding SSIDs
- How to do it...
- Exposing hidden SSIDs
- How to do it...
- Dictionary attack on hidden SSIDs
- How to do it...
- Fake access points with Scapy
- How to do it...
- Layer 2 Attacks
- Introduction
- ARP Watcher
- How to do it...
- ARP cache poisoning
- Getting ready
- Linux
- macOS
- How to do it...
- MAC flooder
- How to do it...
- VLAN hopping
- How to do it...
- ARP spoofing over VLAN hopping
- How to do it...
- DHCP starvation
- How to do it...
- TCP/IP Attacks
- Introduction
- IP spoofing
- How to do it...
- SYN flooding
- How to do it...
- Password sniffer with Python over LAN
- How to do it...
- Introduction to Exploit Development
- Introduction
- CPU registers
- Getting ready
- General purpose registers
- Special purpose registers
- How to do it...
- Memory dump
- How to do it...
- CPU instructions
- How to do it...
- Windows Exploit Development
- Introduction
- Windows memory layout
- Getting ready
- The stack
- The heap
- Program image and dynamic link libraries
- Process Environment Block (PEB)
- Thread Environment Block (TEB)
- How to do it...
- Buffer overflow with saved return pointer overwrite
- Getting ready
- Installing Mona
- How to do it...
- Structured Exception Handling
- Getting ready
- How to do it...
- Egg hunters
- Getting ready
- How to do it...
- Linux Exploit Development
- Introduction
- Format string exploitation
- Getting ready
- Global offset table
- Generating shell code
- How to do it...
- Buffer overflow
- How to do it... 更新時間:2021-07-02 23:09:09
推薦閱讀
- 白話網絡安全2:網安戰略篇
- DevSecOps敏捷安全
- CTF實戰:技術、解題與進階
- 數字身份與元宇宙信任治理
- Kali Linux CTF Blueprints
- 網絡安全應急管理與技術實踐
- Falco云原生安全:Falco原理、實踐與擴展
- 信息安全等級保護測評與整改指導手冊
- 數據安全與流通:技術、架構與實踐
- 博弈論與數據安全
- CTF特訓營:技術詳解、解題方法與競賽技巧
- Mastering Metasploit
- 云計算安全技術與應用
- Blockchain Development with Hyperledger
- 黑客攻防從入門到精通:絕招版(第2版)
- 從實踐中學習TCP/IP協議
- 計算機網絡安全
- Web應用漏洞掃描產品原理與應用
- 互聯網金融法律與風險控制(第2版)
- INSTANT Spring Security Starter
- eBPF云原生安全:原理與實踐
- 網絡安全評估標準實用手冊
- iOS黑客攻防秘籍(第2版)
- 權限提升技術:攻防實戰與技巧
- Hands-On Penetration Testing on Windows
- 網絡靶場與攻防演練
- 黑客攻防從入門到精通(Web腳本編程篇·全新升級版)
- 走近安全:網絡世界的攻與防
- 金融網絡安全
- 博弈系統論:黒客行為預測與管理