Violent Python a cookbook for hackers, forensic analysts, penetration testers and security engineers
Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker's tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates h...
Autor principal: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Waltham, Mass. :
Syngress
c2013.
|
Edición: | 1st edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009628592806719 |
Tabla de Contenidos:
- Half Title; Title page; 1 Introduction; Introduction: A Penetration Test with Python; Setting Up Your Development Environment; Installing Third Party Libraries; Interpreted Python Versus Interactive Python; The Python Language; Variables; Strings; Lists; Dictionaries; Networking; Selection; Exception Handling; Functions; Iteration; File I/O; Sys Module; OS Module; Your First Python Programs; Setting the Stage for Your First Python Program: The Cuckoo's Egg; Your First Program, a UNIX Password Cracker; Setting the Stage for Your Second Program: Using Evil for Good
- Your Second Program, a Zip-File Password CrackerChapter Wrap-Up; References; 2 Penetration Testing with Python; Introduction: The Morris Worm-Would it Work Today?; Building a Port Scanner; TCP Full Connect Scan; Application Banner Grabbing; Threading the Scan; Integrating the Nmap Port Scanner; Building an SSH BotNet with Python; Interacting with SSH Through Pexpect; Brute Forcing SSH Passwords with Pxssh; Exploiting SSH Through Weak Private Keys; Constructing the SSH Botnet; Mass Compromise by Bridging FTP and Web; Building an Anonymous FTP Scanner with Python
- Using Ftplib to Brute Force FTP User CredentialsSearching for Web Pages on the FTP Server; Adding a Malicious Inject to Web Pages; Bringing the Entire Attack Together; Conficker, Why Trying Hard is Always Good Enough; Attacking the Windows SMB Service with Metasploit; Writing Python to Interact with Metasploit; Remote Process Execution Brute Force; Putting it Back Together to Build Our Own Conficker; Writing Your Own Zero-Day Proof of Concept Code; Stack-Based Buffer Overflow Attacks; Adding the Key Elements of the Attack; Sending the Exploit; Assembling the Entire Exploit Script
- Chapter Wrap UpReferences; 3 Forensic Investigations with Python; Introduction: How Forensics Solved the BTK Murders; Where Have You Been?-Analysis of Wireless Access Points in the Registry; Using WinReg to Read the Windows Registry; Using Mechanize to Submit the MAC Address to Wigle; Using Python to Recover Deleted Items in the Recycle Bin; Using the OS Module to Find Deleted Items; Python to Correlate SID to User; Metadata; Using PyPDF to Parse PDF Metadata; Understanding Exif Metadata; Downloading Images with BeautifulSoup; Reading Exif Metadata from Images with the Python Imaging Library
- Investigating Application Artifacts with PythonUnderstanding the Skype Sqlite3 Database; Using Python and Sqlite3 to Automate Skype Database Queries; Parsing Firefox Sqlite3 Databases with Python; Investigating iTunes Mobile Backups with Python; Chapter Wrap-Up; References; 4 Network Traffic Analysis with Python; Introduction: Operation Aurora and How the Obvious was Missed; Where is that IP Traffic Headed?-A Python Answer; Using PyGeoIP to Correlate IP to Physical Locations; Using Dpkt to Parse Packets; Using Python to Build a Google Map; Is Anonymous Really Anonymous? Analyzing LOIC Traffic
- Using Dpkt to Find the LOIC Download