Book Image

Python Penetration Testing Essentials - Second Edition

By : Mohit Raj
Book Image

Python Penetration Testing Essentials - Second Edition

By: Mohit Raj

Overview of this book

This book gives you the skills you need to use Python for penetration testing (pentesting), with the help of detailed code examples. We start by exploring the basics of networking with Python and then proceed to network hacking. Then, you will delve into exploring Python libraries to perform various types of pentesting and ethical hacking techniques. Next, we delve into hacking the application layer, where we start by gathering information from a website. We then move on to concepts related to website hacking—such as parameter tampering, DDoS, XSS, and SQL injection. By reading this book, you will learn different techniques and methodologies that will familiarize you with Python pentesting techniques, how to protect yourself, and how to create automated programs to find the admin console, SQL injection, and XSS attacks.
Table of Contents (11 chapters)

Torrent detection

The major problem for a network admin is to stop the use of torrents on the user machine. Sometimes a small organization or start-up don't have enough funds to purchase a firewall to stop the use of a torrent. In an organization, a user uses the torrent to download movies, songs, and so on, which eats up a lot of bandwidth. In this section, we will see how to eradicate this problem using the Python program. Our program will detect the torrent when a torrent program is running.

The concept is based on the client-server architecture. The server code will be run on the admin machine and the client code will be run on the user's machine in hidden mode. When a user uses the torrent, the client code will notify the server machine.

First, look at the following server code and try to understand the code. The code name is torrent_detection_server.py:

  • Import...