Python for Offensive PenTest: a practical guide to ethical hacking and penetration testing using Python.
Uložené v:
| Názov: | Python for Offensive PenTest: a practical guide to ethical hacking and penetration testing using Python. |
|---|---|
| Autori: | Khrais Hussam. |
| Zdroj: | EN05CEBSCO05C1179 |
| Informácie o vydavateľovi: | Birmingham Packt Publishing |
| Rok vydania: | 2018 |
| Zbierka: | Kazan Federal University Digital Repository |
| Predmety: | Python (Computer program language), Penetration testing (Computer security), Application software -- Testing, COMPUTERS / Programming Languages / Python, COMPUTERS / Software Development & Engineering / Quality Assurance & Testing, Electronic books |
| Popis: | Python is an easy-to-learn and cross-platform programming language which has unlimited third-party libraries. Plenty of open source hacking tools are written in Python and can be easily integrated within your script. This book is divided into clear bite-size chunks so you can learn at your own pace and focus on the areas of most interest to . ; Cover; Title Page; Copyright and Credits; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Warming up -- Your First Antivirus-Free Persistence Shell; Preparing the attacker machine; Setting up internet access; Preparing the target machine; TCP reverse shell; Coding a TCP reverse shell; Server side; Client side; Data exfiltration -- TCP; Server side; Client side; Exporting to EXE; HTTP reverse shell; Coding the HTTP reverse shell; Server side; Client side; Data exfiltration -- HTTP; Client side; Server side; Exporting to EXE; Persistence; Making putty.exe persistent. ; Making a persistent HTTP reverse shellTuning the connection attempts; Tips for preventing a shell breakdown; Countermeasures; Summary; Chapter 2: Advanced Scriptable Shell; Dynamic DNS; DNS aware shell; Interacting with Twitter; Parsing a tweet in three lines; Countermeasures; Replicating Metasploit's screen capturing; Replicating Metasploit searching for content; Target directory navigation; Integrating low-level port scanner; Summary; Chapter 3: Password Hacking; Antivirus free keylogger; Installing pyHook and pywin; Adding code to keylogger; Hijacking KeePass password manager. ; Man in the browserFirefox process; Firefox API hooking with Immunity Debugger; Python in Firefox proof of concept (PoC); Python in Firefox EXE; Dumping saved passwords out of Google Chrome; Acquiring the password remotely; Submitting the recovered password over HTTP session; Testing the file against antivirus; Password phishing -- DNS poisoning; Using Python script; Facebook password phishing; Countermeasures; Securing the online account; Securing your computer; Securing your network; Keeping a watch on any ... |
| Druh dokumentu: | book |
| Jazyk: | English |
| ISBN: | 978-1-78883-246-5 1-78883-246-9 |
| Relation: | http://dspace.kpfu.ru/xmlui/bitstream/net/178482/-1/1801011.pdf; https://dspace.kpfu.ru/xmlui/handle/net/178482 |
| Dostupnosť: | https://dspace.kpfu.ru/xmlui/handle/net/178482 |
| Prístupové číslo: | edsbas.65EBDDAF |
| Databáza: | BASE |
| Abstrakt: | Python is an easy-to-learn and cross-platform programming language which has unlimited third-party libraries. Plenty of open source hacking tools are written in Python and can be easily integrated within your script. This book is divided into clear bite-size chunks so you can learn at your own pace and focus on the areas of most interest to . ; Cover; Title Page; Copyright and Credits; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Warming up -- Your First Antivirus-Free Persistence Shell; Preparing the attacker machine; Setting up internet access; Preparing the target machine; TCP reverse shell; Coding a TCP reverse shell; Server side; Client side; Data exfiltration -- TCP; Server side; Client side; Exporting to EXE; HTTP reverse shell; Coding the HTTP reverse shell; Server side; Client side; Data exfiltration -- HTTP; Client side; Server side; Exporting to EXE; Persistence; Making putty.exe persistent. ; Making a persistent HTTP reverse shellTuning the connection attempts; Tips for preventing a shell breakdown; Countermeasures; Summary; Chapter 2: Advanced Scriptable Shell; Dynamic DNS; DNS aware shell; Interacting with Twitter; Parsing a tweet in three lines; Countermeasures; Replicating Metasploit's screen capturing; Replicating Metasploit searching for content; Target directory navigation; Integrating low-level port scanner; Summary; Chapter 3: Password Hacking; Antivirus free keylogger; Installing pyHook and pywin; Adding code to keylogger; Hijacking KeePass password manager. ; Man in the browserFirefox process; Firefox API hooking with Immunity Debugger; Python in Firefox proof of concept (PoC); Python in Firefox EXE; Dumping saved passwords out of Google Chrome; Acquiring the password remotely; Submitting the recovered password over HTTP session; Testing the file against antivirus; Password phishing -- DNS poisoning; Using Python script; Facebook password phishing; Countermeasures; Securing the online account; Securing your computer; Securing your network; Keeping a watch on any ... |
|---|---|
| ISBN: | 9781788832465 1788832469 |
Nájsť tento článok vo Web of Science