Test Bank for Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers (1st Edition)

By: TJ OConnor
ISBN-10: 1597499579
/ ISBN-13: 9781597499576

Resource Type Information

Format: Downloadable ZIP Fille
Authors: TJ OConnor
Secure Stripe Payment Logo.png


$35.00 $30.00

Instant Download to your account.


Table of content:

Half Title
Title page
1 Introduction
Introduction: A Penetration Test with Python
Setting Up Your Development Environment
Installing Third Party Libraries
Interpreted Python Versus Interactive Python
The Python Language
Exception Handling
File I/O
Sys Module
OS Module
Your First Python Programs
Setting the Stage for Your First Python Program: The Cuckoo’s Egg
Your First Program, a UNIX Password Cracker
Setting the Stage for Your Second Program: Using Evil for Good
Your Second Program, a Zip-File Password Cracker
Chapter Wrap-Up
2 Penetration Testing with Python
Introduction: The Morris Worm—Would it Work Today?
Building a Port Scanner
TCP Full Connect Scan
Application Banner Grabbing
Threading the Scan
Integrating the Nmap Port Scanner
Building an SSH BotNet with Python
Interacting with SSH Through Pexpect
Brute Forcing SSH Passwords with Pxssh
Exploiting SSH Through Weak Private Keys
Constructing the SSH Botnet
Mass Compromise by Bridging FTP and Web
Building an Anonymous FTP Scanner with Python
Using Ftplib to Brute Force FTP User Credentials
Searching for Web Pages on the FTP Server
Adding a Malicious Inject to Web Pages
Bringing the Entire Attack Together
Conficker, Why Trying Hard is Always Good Enough
Attacking the Windows SMB Service with Metasploit
Writing Python to Interact with Metasploit
Remote Process Execution Brute Force
Putting it Back Together to Build Our Own Conficker
Writing Your Own Zero-Day Proof of Concept Code
Stack-Based Buffer Overflow Attacks
Adding the Key Elements of the Attack
Sending the Exploit
Assembling the Entire Exploit Script
Chapter Wrap Up
3 Forensic Investigations with Python
Introduction: How Forensics Solved the BTK Murders
Where Have You Been?—Analysis of Wireless Access Points in the Registry
Using WinReg to Read the Windows Registry
Using Mechanize to Submit the MAC Address to Wigle
Using Python to Recover Deleted Items in the Recycle Bin
Using the OS Module to Find Deleted Items
Python to Correlate SID to User
Using PyPDF to Parse PDF Metadata
Understanding Exif Metadata
Downloading Images with BeautifulSoup
Reading Exif Metadata from Images with the Python Imaging Library
Investigating Application Artifacts with Python
Understanding the Skype Sqlite3 Database
Using Python and Sqlite3 to Automate Skype Database Queries
Parsing Firefox Sqlite3 Databases with Python
Investigating iTunes Mobile Backups with Python
Chapter Wrap-Up
4 Network Traffic Analysis with Python
Introduction: Operation Aurora and How the Obvious was Missed
Where is that IP Traffic Headed?—A Python Answer
Using PyGeoIP to Correlate IP to Physical Locations
Using Dpkt to Parse Packets
Using Python to Build a Google Map
Is Anonymous Really Anonymous? Analyzing LOIC Traffic
Using Dpkt to Find the LOIC Download
Parsing IRC Commands to the Hive
Identifying the DDoS Attack in Progress
How H. D. Moore Solved the Pentagon’s Dilemma
Understanding the TTL Field
Parsing TTL Fields with Scapy
Storm’s Fast-Flux and Conficker’s Domain-Flux
Does Your DNS Know Something You Don’t?
Using Scapy to Parse DNS Traffic
Detecting Fast Flux Traffic with Scapy
Detecting Domain Flux Traffic with Scapy
Kevin Mitnick and TCP Sequence Prediction
Your Very Own TCP Sequence Prediction
Crafting a SYN Flood with Scapy
Calculating TCP Sequence Numbers
Spoofing the TCP Connection
Foiling Intrusion Detection Systems with Scapy
Chapter Wrap Up
5 Wireless Mayhem with Python
Introduction: Wireless (IN)Security and the Iceman
Setting up Your Wireless Attack Environment
Testing Wireless Capture with Scapy
Installing Python Bluetooth Packages
The Wall of Sheep—Passively Listening to Wireless Secrets
Using Python Regular Expressions to Sniff Credit Cards
Sniffing Hotel Guests
Building a Wireless Google Key Logger
Sniffing FTP Credentials
Where Has Your Laptop Been? Python Answers
Listening for 802.11 Probe Requests
Finding Hidden Network 802.11 Beacons
De-cloaking Hidden 802.11 Networks
Intercepting and Spying on UAVs with Python
Intercepting the Traffic, Dissecting the Protocol
Crafting 802.11 Frames with Scapy
Finalizing the Attack, Emergency Landing The UAV
Detecting FireSheep
Understanding WordPress Session Cookies
Herd the Sheep—Catching WordPress Cookie Reuse
Stalking with Bluetooth and Python
Intercepting Wireless Traffic to Find Bluetooth Addresses
Scanning Bluetooth RFCOMM Channels
Using the Bluetooth Service Discovery Protocol
Taking Over a Printer with Python ObexFTP
BlueBugging a Phone with Python
Chapter Wrap Up
6 Web Recon with Python
Introduction: Social Engineering Today
Recon Prior to Attack
Using the Mechanize Library to Browse the Internet
Anonymity – Adding Proxies, User-Agents, Cookies
Finalizing Our AnonBrowser into a Python Class
Scraping Web Pages with AnonBrowser
Parsing HREF Links with Beautiful Soup
Mirroring Images with Beautiful Soup
Research, Investigate, Discovery
Interacting with the Google API in Python
Parsing Tweets with Python
Pulling Location Data Out of Tweets
Parsing Interests from Twitter Using Regular Expressions
Anonymous Email
Mass Social Engineering
Using Smtplib to Email Targets
Spear Phishing with Smtplib
Chapter Wrap-Up
7 Antivirus Evasion with Python
Introduction: Flame On!
Evading Antivirus Programs
Verifying Evasion
Wrap Up

Additional Information

Resource Type:

Ebook Title:



Related Test Books


Your #1 Online Study Guide Resource

* We don’t share your personal info with anyone. Check out our Privacy Policy for more information