Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Python for Offensive PenTest
  • Table Of Contents Toc
  • Feedback & Rating feedback
Python for Offensive PenTest

Python for Offensive PenTest

By : Khrais
3.4 (7)
close
close
Python for Offensive PenTest

Python for Offensive PenTest

3.4 (7)
By: Khrais

Overview of this book

Python is an easy-to-learn and cross-platform programming language that has unlimited third-party libraries. Plenty of open source hacking tools are written in Python, which can be easily integrated within your script. This book is packed with step-by-step instructions and working examples to make you a skilled penetration tester. It is divided into clear bite-sized chunks, so you can learn at your own pace and focus on the areas of most interest to you. This book will teach you how to code a reverse shell and build an anonymous shell. You will also learn how to hack passwords and perform a privilege escalation on Windows with practical examples. You will set up your own virtual hacking environment in VirtualBox, which will help you run multiple operating systems for your testing environment. By the end of this book, you will have learned how to code your own scripts and mastered ethical hacking from scratch.
Table of Contents (8 chapters)
close
close

Firefox API hooking with Immunity Debugger

Firefox uses a function called PR_Write to write data into a TCP socket. This function is located inside a DLL module called nss3.dll. For this demonstration, we need to prepare a Twitter account. Once that account is created and you are logged in, sign out of the account and then log in again. Since we use LastPass, the login credentials will already have been entered by LastPass. Once we click on the Log in button, what will happen behind the scenes?

Behind the scenes, Firefox will load the nss3.dll library and call the PR_Write function to submit the data (login ID and password). Once Firefox performs these steps, we'll set up a breakpoint and intercept traffic. Let's start by installing the Immunity Debugger software from https://debugger.immunityinc.com/ID_register.py. The installation part is quite...

Visually different images
CONTINUE READING
83
Tech Concepts
36
Programming languages
73
Tech Tools
Icon Unlimited access to the largest independent learning library in tech of over 8,000 expert-authored tech books and videos.
Icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Icon 50+ new titles added per month and exclusive early access to books as they are being written.
Python for Offensive PenTest
notes
bookmark Notes and Bookmarks search Search in title playlist Add to playlist download Download options font-size Font size

Change the font size

margin-width Margin width

Change margin width

day-mode Day/Sepia/Night Modes

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY

Submit Your Feedback

Modal Close icon
Modal Close icon
Modal Close icon