Violent Python : a cookbook for hackers, forensic analysts, penetration testers, and security engineers

Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker's tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates h...

Celý popis

Uložené v:
Podrobná bibliografia
Hlavný autor: O'Connor, T. J.
Médium: E-kniha Kniha
Jazyk:English
Vydavateľské údaje: Amsterdam Elsevier 2013
Waltham, Mass Syngress
Elsevier Science & Technology Books
Vydanie:1
Predmet:
ISBN:1597499579, 9781597499576
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker's tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus. - Demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. - Write code to intercept and analyze network traffic using Python. Craft and spoof wireless frames to attack wireless and Bluetooth devices. - Data-mine popular social media websites and evade modern anti-virus.
AbstractList Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker's tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus. - Demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. - Write code to intercept and analyze network traffic using Python. Craft and spoof wireless frames to attack wireless and Bluetooth devices. - Data-mine popular social media websites and evade modern anti-virus.
Author O'Connor, T. J.
Author_xml – sequence: 1
  fullname: O'Connor, T. J.
BackLink https://cir.nii.ac.jp/crid/1130282269991522816$$DView record in CiNii
BookMark eNo9kN1PHCEUxWlam7rqc195aGyadCwXGD76phutJib6YE3fJgwDLp0J2AFr978vu2u8CZecy--SnLNA72KKDqGPQE6AgPi2pASgIQ2RUkDz6w1aQKsl11pwePsqWqn30KKilDCigL9H-wqUaoFz-QEd5fyb1JKtpIzto4f7kCYXC75dl1WK-Ds22KY09vVgn2a8MnZ0c_66ES7mYLGJZlrnUkePLroymxLqYnG5bDkTB5ydfZpDWWMXH0J0dX6I9ryZsjt6uQ_Qz4vzu-Vlc33z42p5et0YQblmDQNmaTsIrzxo45Q2wMnAdM-sF6QfLFjBuKlOe0cZ5YS1Q-8J88QSyj07QMe7f_MYpiknX7qNlUz5P9n1Y67W2xqmrOCXHWjy6J7zKk0ld38nt6U7LdVrtryyn3fs45z-PFWj3RazNbfZTN352RKIZIRCJT_tyBhCZ8OmA9QXRanQWkNLqQLB_gMC6oXV
ContentType eBook
Book
DBID RYH
DEWEY 005.8
DOI 10.1016/C2011-0-07761-X
DatabaseName CiNii Complete
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
DocumentTitleAlternate Cookbook for hackers, forensic analysts, penetration testers and security engineers
EISBN 1597499641
9781597499644
Edition 1
ExternalDocumentID bks00051017
9781597499644
EBC1073021
BB14765685
Genre Electronic books
GroupedDBID 089
20A
38.
5O.
A4J
AAAAS
AABBV
AAGAK
AALIM
AALRI
AAORS
AAXUO
AAZNM
ABARN
ABGWT
ABLXK
ABMAC
ABMRC
ABQPQ
ABQQC
ACLGV
ACNAM
ACXMD
ADCEY
ADVEM
AERYV
AFOJC
AGAMA
AHPGB
AHWGJ
AJFER
ALMA_UNASSIGNED_HOLDINGS
ALTAS
AMCAZ
AMINO
AMYDA
ASVZH
AVWMD
AXHOF
AZZ
BADUN
BBABE
BPBUR
BYTKM
CETPU
CWBAL
CZZ
EBSCA
GEOUK
HGY
IHRAH
JJU
LLQQT
MYL
OHILO
OODEK
PJYGV
PQQKQ
RX7
RYH
SDK
SRW
T1P
WZT
~H6
ESHEC
6XM
DRU
ID FETCH-LOGICAL-a62493-313c25d6f8f19ae89a140d39b3cf60bdc1c634a974be2324035dbf03f0c024f3
ISBN 1597499579
9781597499576
ISICitedReferencesCount 0
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000371893&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
IngestDate Fri Aug 15 18:50:28 EDT 2025
Thu Nov 07 23:53:12 EST 2024
Wed Nov 26 06:08:20 EST 2025
Fri Jun 27 00:54:56 EDT 2025
IsPeerReviewed false
IsScholarly false
LCCN 2012030814
LCCallNum QA76.73.P98 O26 2013eb
LCCallNum_Ident QA76.73.P98 O26 2013
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-a62493-313c25d6f8f19ae89a140d39b3cf60bdc1c634a974be2324035dbf03f0c024f3
Notes Includes bibliographical references and index
Available also in a print ed.
Mode of access: Internet via World Wide Web.
Title from title screen.
OCLC 818851447
PQID EBC1073021
PageCount 289
ParticipantIDs skillsoft_books24x7_bks00051017
askewsholts_vlebooks_9781597499644
proquest_ebookcentral_EBC1073021
nii_cinii_1130282269991522816
PublicationCentury 2000
PublicationDate c2013
2012
2012-12-20
PublicationDateYYYYMMDD 2013-01-01
2012-01-01
2012-12-20
PublicationDate_xml – year: 2013
  text: c2013
PublicationDecade 2010
PublicationPlace Amsterdam
Waltham, Mass
PublicationPlace_xml – name: Amsterdam
– name: Waltham, Mass
– name: Chantilly
PublicationYear 2013
2012
Publisher Elsevier
Syngress
Elsevier Science & Technology Books
Publisher_xml – name: Syngress
– name: Elsevier
– name: Elsevier Science & Technology Books
SSID ssj0000757233
Score 2.02536
Snippet Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on...
SourceID skillsoft
askewsholts
proquest
nii
SourceType Aggregation Database
Publisher
SubjectTerms Penetration testing (Computer security)
Python (Computer program language)
SubjectTermsDisplay Electronic books.
Python (Computer program language)
TableOfContents Kevin Mitnick and TCP Sequence Prediction -- Your Very Own TCP Sequence Prediction -- Crafting a SYN Flood with Scapy -- Calculating TCP Sequence Numbers -- Spoofing the TCP Connection -- Foiling Intrusion Detection Systems with Scapy -- Chapter Wrap-Up -- References -- Chapter 5 Wireless Mayhem with Python -- Introduction: Wireless (IN)Security and the Iceman -- Setting up Your Wireless Attack Environment -- Testing Wireless Capture with Scapy -- Installing Python Bluetooth Packages -- The Wall of Sheep-Passively Listening to Wireless Secrets -- Using Python Regular Expressions to Sniff Credit Cards -- Sniffing Hotel Guests -- Building a Wireless Google Key Logger -- Sniffing FTP Credentials -- Where Has Your Laptop Been? Python Answers -- Listening for 802.11 Probe Requests -- Finding Hidden Network 802.11 Beacons -- De-Cloaking Hidden 802.11 Networks -- Intercepting and Spying on UAVS with Python -- Intercepting the Traffic, Dissecting the Protcol -- Crafting 802.11 Frames with Scapy -- Finalizing the Attack, Emergency Landing the UAV -- Detecting Firesheep -- Understanding Wordpress Session Cookies -- Herd the Sheep-Catching Wordpress Cookie Reuse -- Stalking with Bluetooth and Python -- Intercepting Wireless Traffic to Find Bluetooth Addresses -- Scanning Bluetooth RFCOMM Channels -- Using the Bluetooth Service Discovery Protocol -- Taking over a Printer with Python ObexFTP -- Bluebugging a Phone with Python -- Chapter Wrap-Up -- References -- Chapter 6 Web Recon with Python -- Introduction: Social Engineering Today -- Recon Prior to Attack -- Using the Mechanize Library to Browse the Internet -- Anonymity-Adding Proxies, User-Agents, Cookies -- Finalizing Our AnonBrowser into a Python Class -- Scraping Web Pages with anonBrowser -- Parsing HREF Links with a Beautiful Soup -- Mirroring Images with Beautiful Soup
Research, Investigate, Discovery -- Interacting with the Google API in Python -- Parsing Tweets with Python -- Pulling Location Data out of Tweets -- Parsing Interests from Twitter Using Regular Expressions -- Anonymous Email -- Mass Social Engineering -- Using Smtplib to Email Targets -- Spear Phishing with Smtplib -- Chapter Wrap-Up -- References -- Chapter 7 Antivirus Evasion with Python -- Introduction: Flame On! -- Evading Antivirus Programs -- Verifying Evasion -- Wrap Up -- References -- Index
Intro -- Trademarks -- Acknowledgements -- Dedication -- Contents -- Lead Author - TJ O'Connor -- Contributing Author Bio - Rob Frost -- Technical Editor Bio - Mark Baggett -- Introduction -- Chapter 1 Introduction -- Introduction: A Penetration Test with Python -- Setting up Your Development Environment -- Installing Third Party Libraries -- Interpreted Python Versus Interactive Python -- The Python Lanuage -- Variables -- Strings -- Lists -- Dictionaries -- Networking -- Selection -- Exception Handling -- Functions -- Iteration -- File I/O -- Sys Module -- OS Module -- Your First Python Programs -- Setting the Stage for Your First Python Program: The Cuckoo's Egg -- Your First Program, a UNIX Password Cracker -- Setting the Stage for Your Second Program: Using Evil for Good -- Your Second Program, a Zip-File Password Cracker -- Chapter Wrap-Up -- References -- Chapter 2 Penetration Testing with Python -- Introduction: The Morris Worm-Would it Work Today? -- Building a Port Scanner -- TCP Full Connect Scan -- Application Banner Grabbing -- Threading the Scan -- Integrating the Nmap Scanner -- Building an SSH Botnet with Python -- Interacting with SSH Through Pexpect -- Brute Forcing SSH Passwords with Pxssh -- Exploting SSH Through Weak Private Keys -- Constructing the SSH Botnet -- Mass Compromise by Bridging FTP and WEB -- Building an Anonymous FTP Scanner with Python -- Using Ftplib to Brute Force FTP User Credentials -- Searching the Web Pages on FTP Server -- Adding a Malicious Inject to Web Pages -- Bringing the Entire Attack Together -- Conficker, Why Trying Hard is Always Good Enough -- Attacking the Windows SMB Service with Metasploit -- Writing Python to Interact with Metasploit -- Remote Process Execution Brute Force -- Putting it Back Together to Build Our Own Conficker -- Writing Your Own Zero-Day Proof of Concept Code
Stack-Based Buffer Overflow Attacks -- Adding the Key Elements of the Attack -- Sending the Exploit -- Asembling the Entire Exploit Script -- Chapter Wrap-Up -- References -- Chapter 3 Forensic Investigations with Python -- Introduction: How Forensics Solved the BTK Murders -- Where Have You Been?-Analysis of Wireless Access Points in the Registry -- Using WinReg to Read the Windows Registry -- Using Mechanize to Submit the MAC Address to Wigle -- Using Python to Recover Deleted Items in the Recycle Bin -- Using the OS Module to Find Deleted Items -- Python to Correlate SID to User -- Metadata -- Using PyPDF to Parse PDF Metadata -- Understanding Exif Metadata -- Downloading Images with BeautifulSoup -- Reading Exif Metadata from Images with the Python Imaging Library -- Investigating Applicaton Artifacts with Python -- Understanding the Skype Sqlite3 Database -- Using Python and Sqlite3 to Automate Skype Database Queries -- Parsing Firefox Sqlite3 Databases with Python -- Investigating iTunes Mobile Backups with Python -- Chapter Wrap-Up -- References -- Chapter 4 Network Traffic Analysis with Python -- Introduction: Operation Aurora and How the Obvious Was Missed -- Where is that IP Traffic Headed?-A Python Answer -- Using PyGeoIP to Correlate IP to Physical Locations -- Using Dpkt to Parse Packets -- Using Python to Build a Google Map -- Is Anonymous Really Anonymous? Analyzing Loic Traffic -- Using Dpkt to Find the LOIC Download -- Parsing IRC Commands to the Hive -- Identifying the DDoS Attack in Progress -- How H.D. Moore Solved the Pentagon's Dilemma -- Understanding the TTL Field -- Parsing TTL Fields with Scapy -- Storm's Fast-Flux and Conficker's Domain-Flux -- Does Your DNS Know Something you Don't? -- Using Scapy to Parse DNS Traffic -- Detecting Fast Flux Traffic with Scapy -- Detecting Domain Flux Traffic with Scapy
Title Violent Python : a cookbook for hackers, forensic analysts, penetration testers, and security engineers
URI https://cir.nii.ac.jp/crid/1130282269991522816
https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=1073021
https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9781597499644&uid=none
http://www.books24x7.com/marc.asp?bookid=51017
WOSCitedRecordID wos000371893&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3Pb9MwFH5iBQl24bcoMLAQtzRbHTdxwrFVAQEaO3RTb5HtJBC1CtMcpvLf8-zYaTsOiAMXK3HSOPKX-n3Pfv4ewFuO_x_kDTJkSTVBB0XGoSw5C7kwq1pc0sJKCl184aen6XKZnbksCNqmE-BNk2422eV_hRrrEGyzdfYf4O4fihV4jKBjibBjeYMR96cd4hd2jb0Nzn4ZPYCg28as8B5znw0n_C5MEIVFDk9N6LoRazWqJK2tvMSBz8noBq2VUNA-ulO7PHdB6QQMey7uw2U6v39xHHw63p1KMGkd9qYS_B6XPReTGo8jy-IuS8sfA27n-8-6mdbQaAPRcLm1LX3E33RKJxy5YxofwAG6OAO4_WH-9fxzPx-G1IVHzKTd6FvMnCRX_wZemokmJzdaPIRDoVdoFtBktBp5QlPXez7DXb2q12uNpm2HPiwewMBsKXkIt8rmEdz3iTSIG1cfwzcHHemgI--IIB44gkgRB9yIeNiIh21EdkAjDrQRXi6Ih4z0kD2B8_fzxexj6DJghCJBv9jsfGQqioukSiuaiTLNBDrEBcskU1UyloWiKmETgR0ky8hqK8aFrMasGiskXxV7CoPmR1M-AyKigptFVy4kOsUFPilWXCH7lRlVLBFDeLPTg_n12i7W63wLADLnIRxhx-aqNiU1a97ILxPjYyCNT2kyBOK7PLe_dxHG-Xw6o8aYRHQIr3socttENNnwXK702BmI539p5AXc2368L2HQXv0sj-COum5rffXKfVe_AQ7jXDM
linkProvider ProQuest Ebooks
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.title=Violent+Python+%3A+a+cookbook+for+hackers%2C+forensic+analysts%2C+penetration+testers%2C+and+security+engineers&rft.au=O%27Connor%2C+T.+J.&rft.date=2013-01-01&rft.pub=Elsevier&rft.isbn=9781597499576&rft_id=info:doi/10.1016%2FC2011-0-07761-X&rft.externalDocID=BB14765685
thumbnail_m http://cvtisr.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fvle.dmmserver.com%2Fmedia%2F640%2F97815974%2F9781597499644.jpg