Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Python Penetration Testing Essentials
  • Table Of Contents Toc
Python Penetration Testing Essentials

Python Penetration Testing Essentials - Second Edition

By : Mohit Raj
3.2 (10)
close
close
Python Penetration Testing Essentials

Python Penetration Testing Essentials

3.2 (10)
By: Mohit Raj

Overview of this book

This book gives you the skills you need to use Python for penetration testing (pentesting), with the help of detailed code examples. We start by exploring the basics of networking with Python and then proceed to network hacking. Then, you will delve into exploring Python libraries to perform various types of pentesting and ethical hacking techniques. Next, we delve into hacking the application layer, where we start by gathering information from a website. We then move on to concepts related to website hacking—such as parameter tampering, DDoS, XSS, and SQL injection. By reading this book, you will learn different techniques and methodologies that will familiarize you with Python pentesting techniques, how to protect yourself, and how to create automated programs to find the admin console, SQL injection, and XSS attacks.
Table of Contents (11 chapters)
close
close

Honeypot – Building Traps for Attackers

In Chapter 5, Wireless Pentesting, you saw the various network attacks and how to prevent them. In this chapter, you will see some proactive approaches. In Chapter 2, Scanning Pentesting, you learned about IP scanning using ping sweep and port scanning by using the TCP connect scan. But what happens when the ping-sweep and port-scanning codes give you fake targets? You would try to exploit the fake targets. The machine, which is set up to act as a decoy to lure attackers, records the maneuvers of the attacker. After seeing all the tricks and attacks, the admin can build a new strategy to harden the network. In this chapter, we will use Python code to accomplish the tasks.

In this chapter, we will learn about the following topics:

  • Fake ARP reply
  • Fake ping reply
  • Fake port-scanning reply
  • Fake OS-signature reply to nmap
  • Fake web server...
CONTINUE READING
83
Tech Concepts
36
Programming languages
73
Tech Tools
Icon Unlimited access to the largest independent learning library in tech of over 8,000 expert-authored tech books and videos.
Icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Icon 50+ new titles added per month and exclusive early access to books as they are being written.
Python Penetration Testing Essentials
notes
bookmark Notes and Bookmarks search Search in title playlist Add to playlist font-size Font size

Change the font size

margin-width Margin width

Change margin width

day-mode Day/Sepia/Night Modes

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY

Submit Your Feedback

Modal Close icon
Modal Close icon
Modal Close icon