Book Image

Python Penetration Testing Essentials - Second Edition

By : Mohit Raj
Book Image

Python Penetration Testing Essentials - Second Edition

By: Mohit Raj

Overview of this book

This book gives you the skills you need to use Python for penetration testing (pentesting), with the help of detailed code examples. We start by exploring the basics of networking with Python and then proceed to network hacking. Then, you will delve into exploring Python libraries to perform various types of pentesting and ethical hacking techniques. Next, we delve into hacking the application layer, where we start by gathering information from a website. We then move on to concepts related to website hacking—such as parameter tampering, DDoS, XSS, and SQL injection. By reading this book, you will learn different techniques and methodologies that will familiarize you with Python pentesting techniques, how to protect yourself, and how to create automated programs to find the admin console, SQL injection, and XSS attacks.
Table of Contents (11 chapters)

Honeypot – Building Traps for Attackers

In Chapter 5, Wireless Pentesting, you saw the various network attacks and how to prevent them. In this chapter, you will see some proactive approaches. In Chapter 2, Scanning Pentesting, you learned about IP scanning using ping sweep and port scanning by using the TCP connect scan. But what happens when the ping-sweep and port-scanning codes give you fake targets? You would try to exploit the fake targets. The machine, which is set up to act as a decoy to lure attackers, records the maneuvers of the attacker. After seeing all the tricks and attacks, the admin can build a new strategy to harden the network. In this chapter, we will use Python code to accomplish the tasks.

In this chapter, we will learn about the following topics:

  • Fake ARP reply
  • Fake ping reply
  • Fake port-scanning reply
  • Fake OS-signature reply to nmap
  • Fake web server...