Practical Ethical Hacking with Python: Develop your own ethical hacking tools using Python

Автор: literator от 30-01-2023, 22:03, Коментариев: 0


Practical Ethical Hacking with Python: Develop your own ethical hacking tools using PythonНазвание: Practical Ethical Hacking with Python: Develop your own ethical hacking tools using Python
Автор: Tony Snake
Издательство: Independently published
Год: 2022
Страниц: 289
Язык: английский
Формат: pdf, epub
Размер: 10.2 MB

This book includes almost everything you need to start a job as a Python instructor.

Learn how to make a password generator in Python with the ability to choose the length of each character type using the built-in random, string and argparse modules. Password generators are tools that allow the user to create random and customized strong passwords based on preferences. In this tutorial, we will make a command-line tool in Python for generating passwords. We will use the argparse module to make it easier to parse the command line arguments the user has provided.

Learn how you can make a DHCP listener by sniffing DHCP packets in the network using the Scapy library in Python. Dynamic Host Configuration Protocol (DHCP) is a network protocol that provides clients connected to a network to obtain TCP/IP configuration information (such as the private IP address) from a DHCP server. A DHCP server (can be an access point, router, or configured in a server) dynamically assigns an IP address and other configuration parameters to each device connected to the network. The DHCP protocol uses User Datagram Protocol (UDP) to perform the communication between the server and clients. It is implemented with two port numbers: UDP port number 67 for the server and UDP port number 68 for the client. In this tutorial, we will make a simple DHCP listener using the Scapy library in Python. In other words, we'll be able to listen for DHCP packets in the network and extract valuable information whenever a device connects to the network we're in.

It includes topics:

1. Make a Password Generator in Python
2. Make a DHCP Listener using Scapy in Python
3. Inject Code into HTTP Responses in the Network in Python
4. MAC Address Changer
5. Extract Saved WiFi Passwords
6. Extract Chrome Cookies
7. HTTP Proxy
8. Shodan API
9. Extract Chrome Passwords
10. SYN Flooding Attack
11. SQL Injection Scanner
12. Crack PDF Files
13. Brute Force ZIP File Passwords
14. WiFi Scanner
15. XSS Vulnerability Scanner
16. Brute-Force SSH Servers
17. Hide Data in Images
18. Subdomain Scanner
19. Extract All Website Links
20. Encrypt and Decrypt Files
21. Reverse Shell
22. Sniff HTTP Packets
23. Disconnect Devices from Wi-Fi
24. DNS Spoof attack
25. Make a Keylogger
26. Detect ARP Spoof Attack
27. Build an ARP Spoofer
28. Make a Network Scanner

I have explained every topic in the most simplest way and you can use these topics in multiple place.

Who this book is for:
This book is highly appealing to all tech-savvy students, programming enthusiasts, IT graduates, and computer science professionals who want to build strong proficiency in building Python applications. Prior understanding of Python basic coding concepts like variables, expressions, and control structures is required to begin with this book. You can also read Basic Core Python.

About the Authors:
Tony Snake was received Bachelor of Computer Science from the American University, and Bachelor of Business Administration from the American University, USA. He is becoming Ph.D. Candidate of Department of Data Informatics, (National) Korea Maritime and Ocean University, Busan 49112, Republic of Korea (South Korea). His research interests are social network analysis, Big Data, AI and robotics.

Скачать Practical Ethical Hacking with Python: Develop your own ethical hacking tools using Python

Нашел ошибку? Есть жалоба? Жми!
Пожаловаться администрации
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.
Мы рекомендуем Вам зарегистрироваться либо войти на сайт под своим именем.
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.