Vous êtes sur la page 1sur 5

Course Details

Getting Started with Python


Introducing Python Installing Python on Windows Installing Python on Linux and other Operating Systems

Flow Control in Python


The if Statement The else Clause Using elif Clause The while Statement

Lists in Python

Creating and Using Lists len() with Lists in Operator with Lists Deleting List Element Common list and operations

Functions in Python

Defining Functions Using Parameters and Return Values Using Arguments and Defaults Parameters Using Global Variables and Constants

Object-Oriented Python

Introduction to Object-Oriented Python Creating Classes, Methods and Objects Using Constructor and Attributes Using Class Attributes and Static Methods Understanding Object Encapsulation Private Attributes and Methods Controlling Attribute Access Inheritance Polymorphism

Types, Variables and Input/Output


Using quotes and escape character String Concatenation and Repeater Operators

Using Mathematical Operators with Numbers

For Loops and Tuples


Using for Loops Using Sequence Operators and Functions with Strings Using the in Operator Indexing and Slicing Strings

Dictionaries

Using Dictionaries Accessing Dictionary values Adding, Replacing and Deleting key-value pairs Functions: get(), keys(), values() and items()

File Input and Output and Exceptions


The open Function Input from Text Files Output to Text Files Handling Exceptions

Modules

Using Modules in Programs Writing Modules Importing Modules

Building hacking tools using python


Network Communications Creating a socket Creating port scanner using python Creating a HTTP banner grabber Creating packet sniffer under Linux Creating forensic tools using Python

Violent Python, 1st Edition


A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security

Discover how to use Python to exploit systems and build effective pen testing tools to defend your system from attackers.

Key Features
- Demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. - Write code to intercept and analyze network traffic using Python. Craft and spoof wireless frames to attack wireless and Bluetooth devices. - Data-mine popular social media websites and evade modern anti-virus.

Description
Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attackers tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern antivirus. Readership Penetration Tester, Forensic Analysts, IT Security Professionals (Security Auditors, Security Engineers, Compliance Specialists, etc.)

Violent Python, 1st Edition


1. Introduction 2. Penetration Testing with Python 3. Forensic Investigations with Python

4. Network Traffic Analysis with Python 5. Wireless Mayhem with Python 6. Web Recon with Python 7. Antivirus Evasion with Python

The Skinny on Violent Python


Before diving in, it should be mentioned that the files containing the source code for all recipes in the book are located on its Syngress Homepage. It is recommended to write the code from scratch as the book is read to greatly facilitate learning and retention, but having the code quickly and easily accessible is a nice perk (should it ever be needed). The books contents are broken down as follows: Chapter 1: Introduction Chapter 2: Penetration Testing with Python Chapter 3: Forensic Investigations with Python Chapter 4: Network Traffic Analysis with Python Chapter 5: Wireless Mayhem with Python Chapter 6: Web Recon With Python Chapter 7: Antivirus Evasion with Python Dozens of recipes are packed into the books 288 pages, and readers will likely be surprised at the types of results that can be so easily achieved with Python. While space constraints prevent every recipe from being enumerated in detail, some of the more interesting recipes that are covered throughout the course of the book include:

Developing online and offline password crackers Interacting with Nmap and Metasploit Recreating Conficker Delivering an exploit for a stack-based buffer overflow Pillaging iTunes backups, the Windows registry, and SQLite databases Correlating network traffic to physical locations and creating Google Earth maps Building an SSH Botnet IDS and AV evasion Parsing metadata, web sites, and Tweets Creating social engineering email campaigns Parsing and logging wireless traffic Orchestrating Bluetooth-based attacks Hijacking a UAV The introduction discusses how to setup a Python development environment and serves as a crash-course in the language itself. This will help the reader get up and running, and may serve as a useful refresher for those who have dabbled in the language previously. However, it may be inadequate for someone who has never touched the language before. Note: This is not a criticism of the book, as it would be quite unfair to expect Python programming to be covered thoroughly in a handful of pages when entire books have been dedicated to the subject. Additionally, many of the explanations in the book discuss what actions a particular block of code performs, as opposed to providing a line-by-line breakdown. Being able to read common Python statements will allow the reader to more quickly understand and assimilate the core material. Those with little-to-no Python experience may find themselves better prepared to journey through this title by taking a brief detour and starting with Googles free two-day course and/or Learn Python the Hard Way.

Vous aimerez peut-être aussi