Book Image

Mastering Python for Networking and Security - Second Edition

By : José Ortega
Book Image

Mastering Python for Networking and Security - Second Edition

By: José Ortega

Overview of this book

It’s now more apparent than ever that security is a critical aspect of IT infrastructure, and that devastating data breaches can occur from simple network line hacks. As shown in this book, combining the latest version of Python with an increased focus on network security can help you to level up your defenses against cyber attacks and cyber threats. Python is being used for increasingly advanced tasks, with the latest update introducing new libraries and packages featured in the Python 3.7.4 recommended version. Moreover, most scripts are compatible with the latest versions of Python and can also be executed in a virtual environment. This book will guide you through using these updated packages to build a secure network with the help of Python scripting. You’ll cover a range of topics, from building a network to the procedures you need to follow to secure it. Starting by exploring different packages and libraries, you’ll learn about various ways to build a network and connect with the Tor network through Python scripting. You will also learn how to assess a network's vulnerabilities using Python security scripting. Later, you’ll learn how to achieve endpoint protection by leveraging Python packages, along with writing forensic scripts. By the end of this Python book, you’ll be able to use Python to build secure apps using cryptography and steganography techniques.
Table of Contents (22 chapters)
1
Section 1: The Python Environment and System Programming Tools
4
Section 2: Network Scripting and Extracting Information from the Tor Network with Python
8
Section 3: Server Scripting and Port Scanning with Python
12
Section 4: Server Vulnerabilities and Security in Python Modules
16
Section 5: Python Forensics

Getting information from the Windows registry

The Windows operating system stores all the system configuration information in an internal database called the Windows Registry that is stored as a data dictionary in key-value format for each registry entry.

The registry stores information in a hierarchical way, where the operating system has six entries in the root registry that are located in the system32 folder in the Windows directory structure. In this way, all the contents of the registry have these entries as their starting point.

The following are the top six entry registries and their associated locations in the Windows file structure:

  • HKEY_LOCAL_MACHINE \SYSTEM: system32\config\system
  • HKEY_LOCAL_MACHINE \SAM: system32\config\sam
  • HKEY_LOCAL_MACHINE \SECURITY: system32\config\security
  • HKEY_LOCAL_MACHINE \SOFTWARE: system32\config\software
  • HKEY_USERS \UserProfile: winnt\profiles\username
  • HKEY_USERS.DEFAULT: system32\config\default

Next,...