万本电子书0元读

万本电子书0元读

顶部广告

Python for Offensive PenTest电子书

售       价:¥

4人正在读 | 0人评论 9.8

作       者:Hussam Khrais

出  版  社:Packt Publishing

出版时间:2018-04-26

字       数:20.5万

所属分类: 进口书 > 外文原版书 > 电脑/网络

温馨提示:数字商品不支持退换货,不提供源文件,不支持导出打印

为你推荐

  • 读书简介
  • 目录
  • 累计评论(0条)
  • 读书简介
  • 目录
  • 累计评论(0条)
Your one-stop guide to using Python, creating your own hacking tools, and making the most out of resources available for this programming language About This Book ? Comprehensive information on building a web application penetration testing framework using Python ? Master web application penetration testing using the multi-paradigm programming language Python ? Detect vulnerabilities in a system or application by writing your own Python scripts Who This Book Is For This book is for ethical hackers; penetration testers; students preparing for OSCP, OSCE, GPEN, GXPN, and CEH; information security professionals; cybersecurity consultants; system and network security administrators; and programmers who are keen on learning all about penetration testing. What You Will Learn ? Code your own reverse shell (TCP and HTTP) ? Create your own anonymous shell by interacting with Twitter, Google Forms, and SourceForge ? Replicate Metasploit features and build an advanced shell ? Hack passwords using multiple techniques (API hooking, keyloggers, and clipboard hijacking) ? Exfiltrate data from your target ? Add encryption (AES, RSA, and XOR) to your shell to learn how cryptography is being abused by malware ? Discover privilege escalation on Windows with practical examples ? Countermeasures against most attacks In Detail Python is an easy-to-learn and cross-platform programming language that has unlimited third-party libraries. Plenty of open source hacking tools are written in Python, which can be easily integrated within your script. This book is packed with step-by-step instructions and working examples to make you a skilled penetration tester. It is divided into clear bite-sized chunks, so you can learn at your own pace and focus on the areas of most interest to you. This book will teach you how to code a reverse shell and build an anonymous shell. You will also learn how to hack passwords and perform a privilege escalation on Windows with practical examples. You will set up your own virtual hacking environment in VirtualBox, which will help you run multiple operating systems for your testing environment. By the end of this book, you will have learned how to code your own scripts and mastered ethical hacking from scratch. Style and approach This book follows a practical approach that takes a gradual learning curve, building up your knowledge about ethical hacking, right from scratch. The focus is less on theory and more on practical examples through a step-by-step approach.
目录展开

Title Page

Copyright and Credits

Python for Offensive PenTest

Packt Upsell

Why subscribe?

PacktPub.com

Contributors

About the author

Packt is searching for authors like you

Preface

Who this book is for

What this book covers

To get the most out of this book

Download the example code files

Download the color images

Conventions used

Get in touch

Reviews

Warming up – Your First Antivirus-Free Persistence Shell

Preparing the attacker machine

Setting up internet access

Preparing the target machine

TCP reverse shell

Coding a TCP reverse shell

Server side

Client side

Data exfiltration – TCP

Server side

Client side

Exporting to EXE

HTTP reverse shell

Coding the HTTP reverse shell

Server side

Client side

Data exfiltration – HTTP

Client side

Server side

Exporting to EXE

Persistence

Making putty.exe persistent

Making a persistent HTTP reverse shell

Tuning the connection attempts

Tips for preventing a shell breakdown

Countermeasures

Summary

Advanced Scriptable Shell

Dynamic DNS

DNS aware shell

Interacting with Twitter

Parsing a tweet in three lines

Countermeasures

Replicating Metasploit's screen capturing

Replicating Metasploit searching for content

Target directory navigation

Integrating low-level port scanner

Summary

Password Hacking

Antivirus free keylogger

Installing pyHook and pywin

Adding code to keylogger

Hijacking KeePass password manager

Man in the browser

Firefox process

Firefox API hooking with Immunity Debugger

Python in Firefox proof of concept (PoC)

Python in Firefox EXE

Dumping saved passwords out of Google Chrome

Acquiring the password remotely

Submitting the recovered password over HTTP session

Testing the file against antivirus

Password phishing – DNS poisoning

Using Python script

Facebook password phishing

Countermeasures

Securing the online account

Securing your computer

Securing your network

Keeping a watch on any suspicious activity

Summary

Catch Me If You Can!

Bypassing host-based firewalls

Hijacking IE

Bypassing reputation filtering in next generation firewalls

Interacting with SourceForge

Interacting with Google Forms

Bypassing botnet filtering

Bypassing IPS with handmade XOR encryption

Summary

Miscellaneous Fun in Windows

Privilege escalation – weak service file

Privilege escalation – preparing vulnerable software

Privilege escalation – backdooring legitimate windows service

Privilege escalation – creating a new admin account and covering the tracks

Summary

Abuse of Cryptography by Malware

Introduction to encryption algorithms

Protecting your tunnel with AES – stream mode

Cipher Block Chaining (CBC) mode encryption

Counter (CTR) mode encryption

Protecting your tunnel with RSA

Hybrid encryption key

Summary

Other Books You May Enjoy

Leave a review - let other readers know what you think

累计评论(0条) 0个书友正在讨论这本书 发表评论

发表评论

发表评论,分享你的想法吧!

买过这本书的人还买过

读了这本书的人还在读

回顶部