售 价:¥
温馨提示:数字商品不支持退换货,不提供源文件,不支持导出打印
为你推荐
Effective Python Penetration Testing
Effective Python Penetration Testing
Credits
About the Author
About the Reviewer
www.PacktPub.com
eBooks, discount offers, and more
Why subscribe?
Free access for Packt account holders
Preface
What this book covers
What you need for this book
Who this book is for
Conventions
Reader feedback
Customer support
Downloading the example code
Errata
Piracy
Questions
1. Python Scripting Essentials
Setting up the scripting environment
Setting up in Linux
Setting up in Mac
Setting up in Windows
Installing third-party libraries
Setuptools and pip
Working with virtual environments
Using virtualenv and virtualwrapper
Python language essentials
Variables and types
Strings
Lists
Dictionaries
Networking
Handling exceptions
Summary
2. Analyzing Network Traffic with Scapy
Sockets modules
Socket
Methods in socket module
Creating a socket
Connecting to a server and sending data
Receiving data
Handling multiple connections
SocketServer
Simple server with the SocketServer module
Raw socket programming
Creating a raw socket
Basic raw socket sniffer
Raw socket packet injection
Investigate network traffic with Scapy
Packet sniffing with Scapy
Packet injection with Scapy
Scapy send and receive methods
Programming with Scapy
Summary
3. Application Fingerprinting with Python
Web scraping
urllib / urllib2 module
Useful methods of urllib/urllib2
Requests module
Parsing HTML using BeautifulSoup
Download all images on a page
Parsing HTML with lxml
Scrapy
E-mail gathering
OS fingerprinting
Get the EXIF data of an image
Web application fingerprinting
Summary
4. Attack Scripting with Python
Injections
Broken authentication
Cross-site scripting (XSS)
Insecure direct object references
Security misconfiguration
Sensitive data exposure
Missing function level access control
CSRF attacks
Using components with known vulnerabilities
Unvalidated redirects and forwards
Summary
5. Fuzzing and Brute-Forcing
Fuzzing
Classification of fuzzers
Mutation (dump) fuzzers
Generation (intelligent) fuzzers
Fuzzing and brute-forcing passwords
Dictionary attack
SSH brute-forcing
SMTP brute-forcing
Brute-forcing directories and file locations
Brute-force cracking password protected ZIP files
Sulley fuzzing framework
Installation
Scripting with sulley
Primitives
Blocks and groups
Sessions
Summary
6. Debugging and Reverse Engineering
Reverse engineering
Portable executable analysis
DOS header
PE header
Loading PE file
Inspecting headers
Inspecting sections
PE packers
Listing all imported and exported symbols
Disassembling with Capstone
PEfile with Capstone
Debugging
Breakpoints
Using PyDBG
Summary
7. Crypto, Hash, and Conversion Functions
Cryptographic algorithms
Hash functions
Hashed Message Authentication Code (HMAC)
Message-digest algorithm (MD5)
Secure Hash Algorithm (SHA)
HMAC in Python
hashlib algorithms
Password hashing algorithms
Symmetric encryption algorithms
Block and stream cipher
PyCrypto
AES encryption of a file
Summary
8. Keylogging and Screen Grabbing
Keyloggers
Hardware keyloggers
Software keyloggers
Keyloggers with pyhook
Screen grabbing
Summary
9. Attack Automation
Paramiko
Establish SSH connection with paramiko
Running commands with paramiko
SFTP with paramiko
python-nmap
W3af REST API
Metasploit scripting with MSGRPC
ClamAV antivirus with Python
OWASP ZAP from Python
Breaking weak captcha
Automating BeEF with Python
Installing BeEF
Connecting BeEF with Metasploit
Accessing BeEF API with Python
Accessing Nessus 6 API with Python
Summary
10. Looking Forward
Pentestly
Twisted
Nscan
sqlmap
CapTipper
Immunity Debugger
pytbull
ghost.py
peepdf
Summary
买过这本书的人还买过
读了这本书的人还在读
同类图书排行榜