In this chapter, a lot of details about identifying live hosts on the network, viable targets, and the different communication models were covered. To facilitate your understanding of the protocols and how they communicate, we discussed their different forms at the packet and frame levels. This chapter culminated with the automated exploitation of hosts using the Python nmap
and Scapy
libraries supporting the target identification. In the next chapter, we will build on these concepts to see how to exploit services with dictionary, brute-force, and password spray attacks.
Learning Penetration Testing with Python
By :
Learning Penetration Testing with Python
By:
Overview of this book
Table of Contents (19 chapters)
Learning Penetration Testing with Python
Credits
Disclaimer
About the Author
Acknowlegements
About the Reviewers
www.PacktPub.com
Preface
Free Chapter
Understanding the Penetration Testing Methodology
The Basics of Python Scripting
Identifying Targets with Nmap, Scapy, and Python
Executing Credential Attacks with Python
Exploiting Services with Python
Assessing Web Applications with Python
Cracking the Perimeter with Python
Exploit Development with Python, Metasploit, and Immunity
Automating Reports and Tasks with Python
Adding Permanency to Python Tools
Index
Customer Reviews