Python for Offensive PenTest a practical guide to ethical hacking and penetration testing using Python.

Python is an easy-to-learn and cross-platform programming language which has unlimited third-party libraries. Plenty of open source hacking tools are written in Python and can be easily integrated within your script. This book is divided into clear bite-size chunks so you can learn at your own pace...

Full description

Bibliographic Details
Main Author: Khrais, Hussam
Format: eBook
Language:English
Published: Birmingham Packt Publishing, 2018.
Subjects:
Online Access:EBSCOhost
Перейти в каталог НБ ТГУ
LEADER 04878cam a2200529Mi 4500
001 koha001012942
003 OCoLC
005 20250222065943.0
006 m d
007 cr cnu---unuuu
008 180505s2018 enk o 000 0 eng d
035 |a koha001012942 
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d MERUC  |d IDB  |d CHVBK  |d OCLCO  |d OCLCF  |d NLE  |d TEFOD  |d OCLCQ  |d UKMGB  |d LVT  |d N$T 
015 |a GBB882211  |2 bnb 
016 7 |a 018853900  |2 Uk 
020 |a 9781788832465  |q (electronic bk.) 
020 |a 1788832469  |q (electronic bk.) 
037 |a 9144B033-D47D-41BF-B742-6A53B316BFE3  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a QA76.73.P98  |b .K473 2018eb 
072 7 |a COM  |x 051360  |2 bisacsh 
072 7 |a COM  |x 051330  |2 bisacsh 
082 0 4 |a 005.133  |2 23 
049 |a MAIN 
100 1 |a Khrais, Hussam.  |9 910651 
245 1 0 |a Python for Offensive PenTest  |b a practical guide to ethical hacking and penetration testing using Python. 
260 |a Birmingham  |b Packt Publishing,  |c 2018.  |9 910652 
300 |a 1 online resource (169 pages) 
588 0 |a Print version record. 
505 0 |a Cover; Title Page; Copyright and Credits; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Warming up -- Your First Antivirus-Free Persistence Shell; Preparing the attacker machine; Setting up internet access; Preparing the target machine; TCP reverse shell; Coding a TCP reverse shell; Server side; Client side; Data exfiltration -- TCP; Server side; Client side; Exporting to EXE; HTTP reverse shell; Coding the HTTP reverse shell; Server side; Client side; Data exfiltration -- HTTP; Client side; Server side; Exporting to EXE; Persistence; Making putty.exe persistent. 
505 8 |a Making a persistent HTTP reverse shellTuning the connection attempts; Tips for preventing a shell breakdown; Countermeasures; Summary; Chapter 2: Advanced Scriptable Shell; Dynamic DNS; DNS aware shell; Interacting with Twitter; Parsing a tweet in three lines; Countermeasures; Replicating Metasploit's screen capturing; Replicating Metasploit searching for content; Target directory navigation; Integrating low-level port scanner; Summary; Chapter 3: Password Hacking; Antivirus free keylogger; Installing pyHook and pywin; Adding code to keylogger; Hijacking KeePass password manager. 
505 8 |a Man in the browserFirefox process; Firefox API hooking with Immunity Debugger; Python in Firefox proof of concept (PoC); Python in Firefox EXE; Dumping saved passwords out of Google Chrome; Acquiring the password remotely; Submitting the recovered password over HTTP session; Testing the file against antivirus; Password phishing -- DNS poisoning; Using Python script; Facebook password phishing; Countermeasures; Securing the online account; Securing your computer; Securing your network; Keeping a watch on any suspicious activity; Summary; Chapter 4: Catch Me If You Can! 
505 8 |a Bypassing host-based firewallsHijacking IE; Bypassing reputation filtering in next generation firewalls; Interacting with SourceForge; Interacting with Google Forms; Bypassing botnet filtering; Bypassing IPS with handmade XOR encryption; Summary; Chapter 5: Miscellaneous Fun in Windows; Privilege escalation -- weak service file; Privilege escalation -- preparing vulnerable software; Privilege escalation -- backdooring legitimate windows service; Privilege escalation -- creating a new admin account and covering the tracks; Summary; Chapter 6: Abuse of Cryptography by Malware. 
505 8 |a Introduction to encryption algorithmsProtecting your tunnel with AES -- stream mode; Cipher Block Chaining (CBC) mode encryption; Counter (CTR) mode encryption ; Protecting your tunnel with RSA; Hybrid encryption key; Summary; Other Books You May Enjoy; Index. 
520 |a Python is an easy-to-learn and cross-platform programming language which has unlimited third-party libraries. Plenty of open source hacking tools are written in Python and can be easily integrated within your script. This book is divided into clear bite-size chunks so you can learn at your own pace and focus on the areas of most interest to ... 
653 0 |a Python (Computer program language) 
653 0 |a Penetration testing (Computer security) 
653 0 |a Application software  |x Testing. 
653 7 |a COMPUTERS / Programming Languages / Python.  |2 bisacsh 
653 7 |a COMPUTERS / Software Development & Engineering / Quality Assurance & Testing.  |2 bisacsh 
653 7 |a Application software  |x Testing.  |2 fast  |0 (OCoLC)fst00811716 
655 0 |a EBSCO eBooks  |9 905790 
655 4 |a Electronic books.  |9 899821 
856 4 0 |3 EBSCOhost  |u https://www.lib.tsu.ru/limit/2023/EBSCO/1801011.pdf 
856 |y Перейти в каталог НБ ТГУ  |u https://koha.lib.tsu.ru/cgi-bin/koha/opac-detail.pl?biblionumber=1012942 
910 |a EBSCO eBooks 
999 |c 1012942  |d 1012942 
039