Académique Documents
Professionnel Documents
Culture Documents
Introducing Python Installing Python on Windows Installing Python on Linux and other Operating Systems
The if Statement The else Clause Using elif Clause The while Statement
Lists in Python
Creating and Using Lists len() with Lists in Operator with Lists Deleting List Element Common list and operations
Functions in Python
Defining Functions Using Parameters and Return Values Using Arguments and Defaults Parameters Using Global Variables and Constants
Object-Oriented Python
Introduction to Object-Oriented Python Creating Classes, Methods and Objects Using Constructor and Attributes Using Class Attributes and Static Methods Understanding Object Encapsulation Private Attributes and Methods Controlling Attribute Access Inheritance Polymorphism
Using quotes and escape character String Concatenation and Repeater Operators
Using for Loops Using Sequence Operators and Functions with Strings Using the in Operator Indexing and Slicing Strings
Dictionaries
Using Dictionaries Accessing Dictionary values Adding, Replacing and Deleting key-value pairs Functions: get(), keys(), values() and items()
The open Function Input from Text Files Output to Text Files Handling Exceptions
Modules
Network Communications Creating a socket Creating port scanner using python Creating a HTTP banner grabber Creating packet sniffer under Linux Creating forensic tools using Python
Discover how to use Python to exploit systems and build effective pen testing tools to defend your system from attackers.
Key Features
- Demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. - Write code to intercept and analyze network traffic using Python. Craft and spoof wireless frames to attack wireless and Bluetooth devices. - Data-mine popular social media websites and evade modern anti-virus.
Description
Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attackers tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern antivirus. Readership Penetration Tester, Forensic Analysts, IT Security Professionals (Security Auditors, Security Engineers, Compliance Specialists, etc.)
4. Network Traffic Analysis with Python 5. Wireless Mayhem with Python 6. Web Recon with Python 7. Antivirus Evasion with Python
Developing online and offline password crackers Interacting with Nmap and Metasploit Recreating Conficker Delivering an exploit for a stack-based buffer overflow Pillaging iTunes backups, the Windows registry, and SQLite databases Correlating network traffic to physical locations and creating Google Earth maps Building an SSH Botnet IDS and AV evasion Parsing metadata, web sites, and Tweets Creating social engineering email campaigns Parsing and logging wireless traffic Orchestrating Bluetooth-based attacks Hijacking a UAV The introduction discusses how to setup a Python development environment and serves as a crash-course in the language itself. This will help the reader get up and running, and may serve as a useful refresher for those who have dabbled in the language previously. However, it may be inadequate for someone who has never touched the language before. Note: This is not a criticism of the book, as it would be quite unfair to expect Python programming to be covered thoroughly in a handful of pages when entire books have been dedicated to the subject. Additionally, many of the explanations in the book discuss what actions a particular block of code performs, as opposed to providing a line-by-line breakdown. Being able to read common Python statements will allow the reader to more quickly understand and assimilate the core material. Those with little-to-no Python experience may find themselves better prepared to journey through this title by taking a brief detour and starting with Googles free two-day course and/or Learn Python the Hard Way.