Book Image

Python Penetration Testing Essentials - Second Edition

By : Mohit Raj
Book Image

Python Penetration Testing Essentials - Second Edition

By: Mohit Raj

Overview of this book

This book gives you the skills you need to use Python for penetration testing (pentesting), with the help of detailed code examples. We start by exploring the basics of networking with Python and then proceed to network hacking. Then, you will delve into exploring Python libraries to perform various types of pentesting and ethical hacking techniques. Next, we delve into hacking the application layer, where we start by gathering information from a website. We then move on to concepts related to website hacking—such as parameter tampering, DDoS, XSS, and SQL injection. By reading this book, you will learn different techniques and methodologies that will familiarize you with Python pentesting techniques, how to protect yourself, and how to create automated programs to find the admin console, SQL injection, and XSS attacks.
Table of Contents (11 chapters)

Fake ARP reply

In this section, we will learn how to send a fake ARP reply. The fake ARP reply program is made for the fake ping reply because when the attacker sends the ping request to a particular IP, the attacker machine first sends an ARP request for the MAC address.

When an attacker is on the subnet of the honeypot or outside the subnet, a fake reply will be sent by the honeypot. Let's see the topology diagram:

I have used three machines: Debian running honeypot codes, RHEL, as a gateway, and Kali Linux, as the attacker machine.

Let's see the fake reply code. The code name is arp_reply.py:

  • The following modules will be used in the code:
      import socket
import struct
import binascii
import Queue
import threading
import sys
  • In the following code, two sockets have been created. One for the receiver and one for sending the reply...