Book Image

Python Penetration Testing Essentials - Second Edition

By : Mohit Raj
Book Image

Python Penetration Testing Essentials - Second Edition

By: Mohit Raj

Overview of this book

This book gives you the skills you need to use Python for penetration testing (pentesting), with the help of detailed code examples. We start by exploring the basics of networking with Python and then proceed to network hacking. Then, you will delve into exploring Python libraries to perform various types of pentesting and ethical hacking techniques. Next, we delve into hacking the application layer, where we start by gathering information from a website. We then move on to concepts related to website hacking—such as parameter tampering, DDoS, XSS, and SQL injection. By reading this book, you will learn different techniques and methodologies that will familiarize you with Python pentesting techniques, how to protect yourself, and how to create automated programs to find the admin console, SQL injection, and XSS attacks.
Table of Contents (11 chapters)

Wireless Pentesting

The era of wireless connectivity has enabled flexibility and mobility, but it has also ushered in many security issues. With wired connectivity, the attacker needs physical access in order to connect and attack. In the case of wireless connectivity, an attacker just needs the availability of the signal to launch an attack. Before proceeding, you should be aware of the terminology used:

  • Access Point (AP): This is used to connect wireless devices to wired networks.
  • Service Set Identifier (SSID): This is a unique 0-32 alphanumeric identifier for a wireless LAN. It is human readable and simply put, it is the network name.
  • Basic Service Set Identification (BSSID): This is the MAC address of the wireless AP.
  • Channel number: This represents the range of the radio frequency used by AP for transmission.

The channel number might get changed due to the auto setting...