Book Image

Python Penetration Testing Essentials - Second Edition

By : Mohit Raj
Book Image

Python Penetration Testing Essentials - Second Edition

By: Mohit Raj

Overview of this book

This book gives you the skills you need to use Python for penetration testing (pentesting), with the help of detailed code examples. We start by exploring the basics of networking with Python and then proceed to network hacking. Then, you will delve into exploring Python libraries to perform various types of pentesting and ethical hacking techniques. Next, we delve into hacking the application layer, where we start by gathering information from a website. We then move on to concepts related to website hacking—such as parameter tampering, DDoS, XSS, and SQL injection. By reading this book, you will learn different techniques and methodologies that will familiarize you with Python pentesting techniques, how to protect yourself, and how to create automated programs to find the admin console, SQL injection, and XSS attacks.
Table of Contents (11 chapters)

Fake web server reply

In this section, you will learn how to create a fake web server signature. This is the application layer code. This section's code has no relation to the previous code. In order to get the server signature or banner grabbing, I am going to use the ID Serve tool.

Let's see the fake_webserver.py code:

  • Use the following modules in the program. The logger1 module is used to create a log file. You will see the code of logger1 later:
   from BaseHTTPServer import BaseHTTPRequestHandler, HTTPServer
import logger1
  • Look at the following piece of code carefully. The fakewebserver class inherits the BaseHTTPRequestHandler class. The send_response method is overriding the method of the BaseHTTPRequestHandler class because we are sending our custom message as self.send_header('Server', "mohitraj"). The log_date_time_string and send_header...