封面
版权信息
Credits
About the Author
About the Reviewers
www.PacktPub.com
Why subscribe?
Customer Feedback
Preface
What this book covers
What you need for this book
Who this book is for
Sections
Getting ready
How to do it…
Conventions
Reader feedback
Customer support
Downloading the example code
Downloading the color images of this book
Errata
Piracy
Questions
Why Python in Penetration Testing?
Introduction
Why Python is a great option for security scripting
Getting ready
How to do it...
Python can be used in both and interpreted and compiled forms
Syntax and indented layout
Simple learning curve
Powerful third-party libraries
Cross-platform (code anywhere)
Python 3 language basics and differences
Getting ready
How to do it...
Python 2
Python 3
Python 2.7
Key differences between Python 2.7 and Python 3
Setting Up a Python Environment
Introduction
Setting up a Python environment in Linux
Getting ready
How to do it...
Installing Python
Setting up a virtual environment
Setting up the editor or IDE
Setting up a Python environment in macOS
Getting ready
How to do it...
Installing Python
Setting up a Python environment in Windows
How to do it...
Web Scraping with Python
Introduction
Download web pages with Python scripts
Getting ready
How to do it...
With Python 2
With Python 3
Changing the user agent
How to do it...
Downloading files
Getting ready
How to do it...
Using a regular expression to get the information from the downloaded web pages
How to do it...
Requesting and downloading dynamic website pages
Escaping invalid characters
How to do it...
Dynamic GET requests
How to do it...
Data Parsing with Python
Introduction
Parsing HTML tables
Getting ready
How to do it...
Extracting data from HTML documents
Getting ready
How to do it...
Parsing XML data
Getting ready
How to do it...
Web Scraping with Scrapy and BeautifulSoup
Introduction
Web spiders with Scrapy
Getting ready
How to do it...
Scrapy shell
How to do it...
Link extractor with Scrapy
How to do it...
Scraping after logging into websites using Scrapy
Getting ready
How to do it...
Network Scanning with Python
Introduction
Simple port scanner
Getting ready
How to do it...
IP range/network scanner
Getting ready
How to do it...
Stealth scanning
Getting ready
How to do it...
FIN scanning
How to do it...
XMAS scanning
How to do it...
TCP ACK scanning
How to do it...
LanScan
Getting ready
How to do it...
Network Sniffing with Python
Introduction
Packet sniffer in Python
Getting ready
How to do it...
Parsing the packet
How to do it...
PyShark
Getting ready
How to do it...
Scapy Basics
Introduction
Creating a packet with Scapy
Getting ready
How to do it...
Sending and receiving packets with Scapy
How to do it...
Layering packets
How to do it...
Reading and writing to pcap files
How to do it...
Sniffing packets
How to do it...
ARP man-in-the-middle tool with Scapy
How to do it...
Wi-Fi Sniffing
Introduction
Finding Wi-Fi devices
Getting ready
How to do it...
Linux
macOS
Finding SSIDs
How to do it...
Exposing hidden SSIDs
How to do it...
Dictionary attack on hidden SSIDs
How to do it...
Fake access points with Scapy
How to do it...
Layer 2 Attacks
Introduction
ARP Watcher
How to do it...
ARP cache poisoning
Getting ready
Linux
macOS
How to do it...
MAC flooder
How to do it...
VLAN hopping
How to do it...
ARP spoofing over VLAN hopping
How to do it...
DHCP starvation
How to do it...
TCP/IP Attacks
Introduction
IP spoofing
How to do it...
SYN flooding
How to do it...
Password sniffer with Python over LAN
How to do it...
Introduction to Exploit Development
Introduction
CPU registers
Getting ready
General purpose registers
Special purpose registers
How to do it...
Memory dump
How to do it...
CPU instructions
How to do it...
Windows Exploit Development
Introduction
Windows memory layout
Getting ready
The stack
The heap
Program image and dynamic link libraries
Process Environment Block (PEB)
Thread Environment Block (TEB)
How to do it...
Buffer overflow with saved return pointer overwrite
Getting ready
Installing Mona
How to do it...
Structured Exception Handling
Getting ready
How to do it...
Egg hunters
Getting ready
How to do it...
Linux Exploit Development
Introduction
Format string exploitation
Getting ready
Global offset table
Generating shell code
How to do it...
Buffer overflow
How to do it...
更新时间:2021-07-02 23:09:09