In this chapter, we gave an overview of Windows memory structures and how we try to take advantage of poor coding practices. We then highlighted how to generate your own exploits using Python code using targeted testing and proof of concept code. This chapter then rounded out, how to reverse Metasploit modules to create standalone exploits that can be used to improve current modules capabilities or generate new exploits. In the next chapter, we will highlight how to automate reporting of details found during a penetration test and how to parse eXtensible Markup Language (XML).
Learning Penetration Testing with Python
By :
Learning Penetration Testing with Python
By:
Overview of this book
Table of Contents (19 chapters)
Learning Penetration Testing with Python
Credits
Disclaimer
About the Author
Acknowlegements
About the Reviewers
www.PacktPub.com
Preface
Free Chapter
Understanding the Penetration Testing Methodology
The Basics of Python Scripting
Identifying Targets with Nmap, Scapy, and Python
Executing Credential Attacks with Python
Exploiting Services with Python
Assessing Web Applications with Python
Cracking the Perimeter with Python
Exploit Development with Python, Metasploit, and Immunity
Automating Reports and Tasks with Python
Adding Permanency to Python Tools
Index
Customer Reviews