Python for Offensive PenTest a practical guide to ethical hacking and penetration testing using Python.
Python is an easy-to-learn and cross-platform programming language which has unlimited third-party libraries. Plenty of open source hacking tools are written in Python and can be easily integrated within your script. This book is divided into clear bite-size chunks so you can learn at your own pace...
| Main Author: | |
|---|---|
| Format: | eBook |
| Language: | English |
| Published: |
Birmingham
Packt Publishing,
2018.
|
| Subjects: | |
| Online Access: | EBSCOhost Перейти в каталог НБ ТГУ |
| LEADER | 04878cam a2200529Mi 4500 | ||
|---|---|---|---|
| 001 | koha001012942 | ||
| 003 | OCoLC | ||
| 005 | 20250222065943.0 | ||
| 006 | m d | ||
| 007 | cr cnu---unuuu | ||
| 008 | 180505s2018 enk o 000 0 eng d | ||
| 035 | |a koha001012942 | ||
| 040 | |a EBLCP |b eng |e pn |c EBLCP |d MERUC |d IDB |d CHVBK |d OCLCO |d OCLCF |d NLE |d TEFOD |d OCLCQ |d UKMGB |d LVT |d N$T | ||
| 015 | |a GBB882211 |2 bnb | ||
| 016 | 7 | |a 018853900 |2 Uk | |
| 020 | |a 9781788832465 |q (electronic bk.) | ||
| 020 | |a 1788832469 |q (electronic bk.) | ||
| 037 | |a 9144B033-D47D-41BF-B742-6A53B316BFE3 |b OverDrive, Inc. |n http://www.overdrive.com | ||
| 050 | 4 | |a QA76.73.P98 |b .K473 2018eb | |
| 072 | 7 | |a COM |x 051360 |2 bisacsh | |
| 072 | 7 | |a COM |x 051330 |2 bisacsh | |
| 082 | 0 | 4 | |a 005.133 |2 23 |
| 049 | |a MAIN | ||
| 100 | 1 | |a Khrais, Hussam. |9 910651 | |
| 245 | 1 | 0 | |a Python for Offensive PenTest |b a practical guide to ethical hacking and penetration testing using Python. |
| 260 | |a Birmingham |b Packt Publishing, |c 2018. |9 910652 | ||
| 300 | |a 1 online resource (169 pages) | ||
| 588 | 0 | |a Print version record. | |
| 505 | 0 | |a Cover; Title Page; Copyright and Credits; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Warming up -- Your First Antivirus-Free Persistence Shell; Preparing the attacker machine; Setting up internet access; Preparing the target machine; TCP reverse shell; Coding a TCP reverse shell; Server side; Client side; Data exfiltration -- TCP; Server side; Client side; Exporting to EXE; HTTP reverse shell; Coding the HTTP reverse shell; Server side; Client side; Data exfiltration -- HTTP; Client side; Server side; Exporting to EXE; Persistence; Making putty.exe persistent. | |
| 505 | 8 | |a Making a persistent HTTP reverse shellTuning the connection attempts; Tips for preventing a shell breakdown; Countermeasures; Summary; Chapter 2: Advanced Scriptable Shell; Dynamic DNS; DNS aware shell; Interacting with Twitter; Parsing a tweet in three lines; Countermeasures; Replicating Metasploit's screen capturing; Replicating Metasploit searching for content; Target directory navigation; Integrating low-level port scanner; Summary; Chapter 3: Password Hacking; Antivirus free keylogger; Installing pyHook and pywin; Adding code to keylogger; Hijacking KeePass password manager. | |
| 505 | 8 | |a Man in the browserFirefox process; Firefox API hooking with Immunity Debugger; Python in Firefox proof of concept (PoC); Python in Firefox EXE; Dumping saved passwords out of Google Chrome; Acquiring the password remotely; Submitting the recovered password over HTTP session; Testing the file against antivirus; Password phishing -- DNS poisoning; Using Python script; Facebook password phishing; Countermeasures; Securing the online account; Securing your computer; Securing your network; Keeping a watch on any suspicious activity; Summary; Chapter 4: Catch Me If You Can! | |
| 505 | 8 | |a Bypassing host-based firewallsHijacking IE; Bypassing reputation filtering in next generation firewalls; Interacting with SourceForge; Interacting with Google Forms; Bypassing botnet filtering; Bypassing IPS with handmade XOR encryption; Summary; Chapter 5: Miscellaneous Fun in Windows; Privilege escalation -- weak service file; Privilege escalation -- preparing vulnerable software; Privilege escalation -- backdooring legitimate windows service; Privilege escalation -- creating a new admin account and covering the tracks; Summary; Chapter 6: Abuse of Cryptography by Malware. | |
| 505 | 8 | |a Introduction to encryption algorithmsProtecting your tunnel with AES -- stream mode; Cipher Block Chaining (CBC) mode encryption; Counter (CTR) mode encryption ; Protecting your tunnel with RSA; Hybrid encryption key; Summary; Other Books You May Enjoy; Index. | |
| 520 | |a Python is an easy-to-learn and cross-platform programming language which has unlimited third-party libraries. Plenty of open source hacking tools are written in Python and can be easily integrated within your script. This book is divided into clear bite-size chunks so you can learn at your own pace and focus on the areas of most interest to ... | ||
| 653 | 0 | |a Python (Computer program language) | |
| 653 | 0 | |a Penetration testing (Computer security) | |
| 653 | 0 | |a Application software |x Testing. | |
| 653 | 7 | |a COMPUTERS / Programming Languages / Python. |2 bisacsh | |
| 653 | 7 | |a COMPUTERS / Software Development & Engineering / Quality Assurance & Testing. |2 bisacsh | |
| 653 | 7 | |a Application software |x Testing. |2 fast |0 (OCoLC)fst00811716 | |
| 655 | 0 | |a EBSCO eBooks |9 905790 | |
| 655 | 4 | |a Electronic books. |9 899821 | |
| 856 | 4 | 0 | |3 EBSCOhost |u https://www.lib.tsu.ru/limit/2023/EBSCO/1801011.pdf |
| 856 | |y Перейти в каталог НБ ТГУ |u https://koha.lib.tsu.ru/cgi-bin/koha/opac-detail.pl?biblionumber=1012942 | ||
| 910 | |a EBSCO eBooks | ||
| 999 | |c 1012942 |d 1012942 | ||
| 039 | |||
