Python Penetration Testing Essentials: Employ the power of Python to get the best out
of pentesting
Download
Introduction
This book is a practical guide that shows you the advantages of using Python for
pentesting, with the help of detailed code examples. This book starts by exploring
the basics of networking with Python and then proceeds to network and wireless
pentesting, including information gathering and attacking. Later on, we delve into
hacking the application layer, where we start by gathering information from a
website, and then eventually move on to concepts related to website hacking,
such as parameter tampering, DDOS, XSS, and SQL injection
What this book covers
Chapter 1, Python with Penetration Testing and Networking, aims to complete the
prerequisites of the following chapters. This chapter also discusses the socket
and its methods. The server socket's method defines how to create a simple server.
Chapter 2, Scanning Pentesting, covers how network scanning is done to gather
information on a network, host, and the service that are running on the hosts.
Chapter 3, Sniffing and Penetration Testing, teaches how to perform active sniffing,
how to create a layer 4 sniffer, and how to perform layer 3 and layer 4 attacks.
Chapter 4, Wireless Pentesting, teaches wireless frames and how to obtain information
such as SSID, BSSID, and the channel number from a wireless frame using a Python
script. In this type of attack, you will learn how to perform pentesting attacks on
the AP.
Chapter 5, Foot Printing of a Web Server and a Web Application, teaches the importance
of a web server signature, and why knowing the server signature is the first step
in hacking.
Chapter 6, Client-side and DDoS Attacks, teaches client-side validation as well as how
to bypass client-side validation. This chapter covers the implantation of four types of
DDoS attacks
Chapter 7, Pentesting of SQLI and XSS, covers two major web attacks, SQL injection
and XSS. In SQL injection, you will learn how to find the admin login page using a
Python script
What you need for this book
You will need to have Python 2.7, Apache 2.x, RHEL 5.0 or CentOS 5.0, and Kali Linux.
Who this book is for
If you are a Python programmer or a security researcher who has basic knowledge
of Python programming and want to learn about penetration testing with the help of
Python, this book is ideal for you. Even if you are new to the field of ethical hacking,
this book can help you find the vulnerabilities in your system so that you are ready
to tackle any kind of attack or intrusion.
Home Web Development Python Penetration Testing Essentials