舉報

會員
Python Penetration Testing Cookbook
最新章節:
How to do it...
IfyouareadeveloperwithpriorknowledgeofusingPythonforpenetrationtestingandifyouwantanoverviewofscriptingtaskstoconsiderwhilepenetrationtesting,thisbookwillgiveyoualotofusefulcodeforyourtoolkit.
目錄(221章)
倒序
- 封面
- 版權信息
- Credits
- About the Author
- About the Reviewers
- www.PacktPub.com
- Why subscribe?
- Customer Feedback
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Sections
- Getting ready
- How to do it…
- Conventions
- Reader feedback
- Customer support
- Downloading the example code
- Downloading the color images of this book
- Errata
- Piracy
- Questions
- Why Python in Penetration Testing?
- Introduction
- Why Python is a great option for security scripting
- Getting ready
- How to do it...
- Python can be used in both and interpreted and compiled forms
- Syntax and indented layout
- Simple learning curve
- Powerful third-party libraries
- Cross-platform (code anywhere)
- Python 3 language basics and differences
- Getting ready
- How to do it...
- Python 2
- Python 3
- Python 2.7
- Key differences between Python 2.7 and Python 3
- Setting Up a Python Environment
- Introduction
- Setting up a Python environment in Linux
- Getting ready
- How to do it...
- Installing Python
- Setting up a virtual environment
- Setting up the editor or IDE
- Setting up a Python environment in macOS
- Getting ready
- How to do it...
- Installing Python
- Setting up a Python environment in Windows
- How to do it...
- Web Scraping with Python
- Introduction
- Download web pages with Python scripts
- Getting ready
- How to do it...
- With Python 2
- With Python 3
- Changing the user agent
- How to do it...
- Downloading files
- Getting ready
- How to do it...
- Using a regular expression to get the information from the downloaded web pages
- How to do it...
- Requesting and downloading dynamic website pages
- Escaping invalid characters
- How to do it...
- Dynamic GET requests
- How to do it...
- Data Parsing with Python
- Introduction
- Parsing HTML tables
- Getting ready
- How to do it...
- Extracting data from HTML documents
- Getting ready
- How to do it...
- Parsing XML data
- Getting ready
- How to do it...
- Web Scraping with Scrapy and BeautifulSoup
- Introduction
- Web spiders with Scrapy
- Getting ready
- How to do it...
- Scrapy shell
- How to do it...
- Link extractor with Scrapy
- How to do it...
- Scraping after logging into websites using Scrapy
- Getting ready
- How to do it...
- Network Scanning with Python
- Introduction
- Simple port scanner
- Getting ready
- How to do it...
- IP range/network scanner
- Getting ready
- How to do it...
- Stealth scanning
- Getting ready
- How to do it...
- FIN scanning
- How to do it...
- XMAS scanning
- How to do it...
- TCP ACK scanning
- How to do it...
- LanScan
- Getting ready
- How to do it...
- Network Sniffing with Python
- Introduction
- Packet sniffer in Python
- Getting ready
- How to do it...
- Parsing the packet
- How to do it...
- PyShark
- Getting ready
- How to do it...
- Scapy Basics
- Introduction
- Creating a packet with Scapy
- Getting ready
- How to do it...
- Sending and receiving packets with Scapy
- How to do it...
- Layering packets
- How to do it...
- Reading and writing to pcap files
- How to do it...
- Sniffing packets
- How to do it...
- ARP man-in-the-middle tool with Scapy
- How to do it...
- Wi-Fi Sniffing
- Introduction
- Finding Wi-Fi devices
- Getting ready
- How to do it...
- Linux
- macOS
- Finding SSIDs
- How to do it...
- Exposing hidden SSIDs
- How to do it...
- Dictionary attack on hidden SSIDs
- How to do it...
- Fake access points with Scapy
- How to do it...
- Layer 2 Attacks
- Introduction
- ARP Watcher
- How to do it...
- ARP cache poisoning
- Getting ready
- Linux
- macOS
- How to do it...
- MAC flooder
- How to do it...
- VLAN hopping
- How to do it...
- ARP spoofing over VLAN hopping
- How to do it...
- DHCP starvation
- How to do it...
- TCP/IP Attacks
- Introduction
- IP spoofing
- How to do it...
- SYN flooding
- How to do it...
- Password sniffer with Python over LAN
- How to do it...
- Introduction to Exploit Development
- Introduction
- CPU registers
- Getting ready
- General purpose registers
- Special purpose registers
- How to do it...
- Memory dump
- How to do it...
- CPU instructions
- How to do it...
- Windows Exploit Development
- Introduction
- Windows memory layout
- Getting ready
- The stack
- The heap
- Program image and dynamic link libraries
- Process Environment Block (PEB)
- Thread Environment Block (TEB)
- How to do it...
- Buffer overflow with saved return pointer overwrite
- Getting ready
- Installing Mona
- How to do it...
- Structured Exception Handling
- Getting ready
- How to do it...
- Egg hunters
- Getting ready
- How to do it...
- Linux Exploit Development
- Introduction
- Format string exploitation
- Getting ready
- Global offset table
- Generating shell code
- How to do it...
- Buffer overflow
- How to do it... 更新時間:2021-07-02 23:09:09
推薦閱讀
- 白話網絡安全2:網安戰略篇
- CTF實戰:技術、解題與進階
- 計算機網絡安全技術(第6版·慕課版)
- 工業互聯網安全防護與展望
- 零信任網絡:在不可信網絡中構建安全系統
- Web安全與攻防入門很輕松(實戰超值版)
- 軟件開發安全之道:概念、設計與實施
- Testing and Securing Android Studio Applications
- 學電腦安全與病毒防范
- 網絡安全設計、配置與管理大全
- 編譯與反編譯技術實戰
- Learning Pentesting for Android Devices
- 構建新型網絡形態下的網絡空間安全體系
- Kali Linux高級滲透測試(原書第4版)
- 網絡空間安全導論
- 聯邦學習原理與算法
- 網絡安全設計
- 隱私計算與密碼學應用實踐
- Cisco Firepower威脅防御(FTD)設備的高級排錯與配置
- 應用密碼學:原理、分析與Python實現
- 從實踐中學習Fiddler Web應用分析
- 信息安全測評實戰指南
- 商用密碼權威指南:技術詳解、產品開發與工程實踐
- 網絡安全工具攻防實戰從新手到高手(微課超值版)
- 漏洞
- 構建可信白環境:方法與實踐
- 大模型安全、監管與合規
- Kali Linux Intrusion and Exploitation Cookbook
- 響應式安全:構建企業信息安全體系
- 移動終端安全架構及關鍵技術