Mastering Python Penetration Testing 1st Edition by Rejah Rehim – Ebook PDF Instant Download/Delivery: 1785280962, 9781785280962
Full download Mastering Python Penetration Testing 1st Edition after payment
Product details:
ISBN 10: 1785280962
ISBN 13: 9781785280962
Author: Rejah Rehim
This book is ideal for those who are comfortable with Python or a similar language and need no help with basic programming concepts, but want to understand the basics of penetration testing and the problems pentesters face.
Mastering Python Penetration Testing 1st Table of contents:
1. Python Scripting Essentials
Setting up the scripting environment
Setting up in Linux
Setting up in Mac
Setting up in Windows
Installing third-party libraries
Setuptools and pip
Working with virtual environments
Using virtualenv and virtualwrapper
Python language essentials
Variables and types
Strings
Lists
Dictionaries
Networking
Handling exceptions
Summary
2. Analyzing Network Traffic with Scapy
Sockets modules
Socket
Methods in socket module
Creating a socket
Connecting to a server and sending data
Receiving data
Handling multiple connections
SocketServer
Simple server with the SocketServer module
Raw socket programming
Creating a raw socket
Basic raw socket sniffer
Raw socket packet injection
Investigate network traffic with Scapy
Packet sniffing with Scapy
Packet injection with Scapy
Scapy send and receive methods
Programming with Scapy
Summary
3. Application Fingerprinting with Python
Web scraping
urllib / urllib2 module
Useful methods of urllib/urllib2
Requests module
Parsing HTML using BeautifulSoup
Download all images on a page
Parsing HTML with lxml
Scrapy
E-mail gathering
OS fingerprinting
Get the EXIF data of an image
Web application fingerprinting
Summary
4. Attack Scripting with Python
Injections
Broken authentication
Cross-site scripting (XSS)
Insecure direct object references
Security misconfiguration
Sensitive data exposure
Missing function level access control
CSRF attacks
Using components with known vulnerabilities
Unvalidated redirects and forwards
Summary
5. Fuzzing and Brute-Forcing
Fuzzing
Classification of fuzzers
Mutation (dump) fuzzers
Generation (intelligent) fuzzers
Fuzzing and brute-forcing passwords
Dictionary attack
SSH brute-forcing
SMTP brute-forcing
Brute-forcing directories and file locations
Brute-force cracking password protected ZIP files
Sulley fuzzing framework
Installation
Scripting with sulley
Primitives
Blocks and groups
Sessions
Summary
6. Debugging and Reverse Engineering
Reverse engineering
Portable executable analysis
DOS header
PE header
Loading PE file
Inspecting headers
Inspecting sections
PE packers
Listing all imported and exported symbols
Disassembling with Capstone
PEfile with Capstone
Debugging
Breakpoints
Using PyDBG
Summary
7. Crypto, Hash, and Conversion Functions
Cryptographic algorithms
Hash functions
Hashed Message Authentication Code (HMAC)
Message-digest algorithm (MD5)
Secure Hash Algorithm (SHA)
HMAC in Python
hashlib algorithms
Password hashing algorithms
Symmetric encryption algorithms
Block and stream cipher
PyCrypto
AES encryption of a file
Summary
8. Keylogging and Screen Grabbing
Keyloggers
Hardware keyloggers
Software keyloggers
Keyloggers with pyhook
Screen grabbing
Summary
9. Attack Automation
Paramiko
Establish SSH connection with paramiko
Running commands with paramiko
SFTP with paramiko
python-nmap
W3af REST API
Metasploit scripting with MSGRPC
ClamAV antivirus with Python
OWASP ZAP from Python
Breaking weak captcha
Automating BeEF with Python
Installing BeEF
Connecting BeEF with Metasploit
Accessing BeEF API with Python
Accessing Nessus 6 API with Python
Summary
10. Looking Forward
Pentestly
Twisted
Nscan
sqlmap
CapTipper
Immunity Debugger
pytbull
ghost.py
peepdf
Summary
People also search for Mastering Python Penetration Testing 1st:
python penetration testing
ethical hacking with python
python cybersecurity tools
penetration testing tutorials
offensive security python
Tags: Mastering Python, Penetration, Testing, Rejah Rehim



