During research or in a rare engagement, you may need to develop or modify exploits to meet your needs. Python is a fantastic language to quickly prototype code for testing exploits or to help with the future modification of Metasploit modules. This chapter focuses on the methodology to write an exploit, not how to create specific exploits for these software products, so that more testing may be necessary to improve reliability. To begin, we need to understand how the Central Processing Unit (CPU) registers and how Windows memory is structured for executables when they run. Before that, on Windows XP Run Mode Virtual Machine (VM), you will need a few tools to test this out.
Learning Penetration Testing with Python
By :
Learning Penetration Testing with Python
By:
Overview of this book
Table of Contents (19 chapters)
Learning Penetration Testing with Python
Credits
Disclaimer
About the Author
Acknowlegements
About the Reviewers
www.PacktPub.com
Preface
Free Chapter
Understanding the Penetration Testing Methodology
The Basics of Python Scripting
Identifying Targets with Nmap, Scapy, and Python
Executing Credential Attacks with Python
Exploiting Services with Python
Assessing Web Applications with Python
Cracking the Perimeter with Python
Exploit Development with Python, Metasploit, and Immunity
Automating Reports and Tasks with Python
Adding Permanency to Python Tools
Index
Customer Reviews