- Length: 198 pages
- Edition: 1
- Language: English
- Publisher: Packt Publishing
- Publication Date: 2018-05-09
- ISBN-10: 1788838971
- ISBN-13: 9781788838979
- Sales Rank: #712517 (See Top 100 Books)
Python For Offensive PenTest: A complete practical guide to ethical hacking and penetration testing using Python
Your one-stop guide to using Python along with creating your own hacking tools, and make the most out of available resources that are made using this programming language.
- Power-packed with comprehensive information on how to build a web application penetration testing framework using Python
- Master web application penetration testing using the multi-paradigm programming language Python
- Instead of relying on external tools, detect vulnerabilities in a system or application by writing your own Python script
Python is easy to learn and a cross-platform programming language which has unlimited third party libraries. Plenty of open source hacking tools are written in python which can be easily integrated within your script.
This book is packed with step-by-step instructions and working examples which make you a true penetration tester. It is divided into clear bite-size chunks so you can learn at your own pace and focus on the areas of most interest to you. This book will teach you how to code your reverse shell and make an anonymous shell. You will learn how to hack passwords and how to perform privilege escalation on Windows with practical examples. You will be setting up your own virtual hacking environment in virtual box. Finally, you can challenge yourself with exercises which will enable you to test your knowledge.
By the end of this book, you will learn how to code your own scripts and learn ethical hacking from scratch.
What You Will Learn
- Learn how to code your own reverse shell [TCP+HTTP]
- Make anonymous shell by interacting with [Twitter, Google Form, Sourceforge]
- Replicate Metasploit features and make an advanced shell
- Learn how to hack passwords using multiple techniques [API Hooking. Keylogger, – Clipboard Hijacking]
- Learn how to exfiltrate data from your target
- Learn how malware abusing cryptography by adding [AES,RSA,XOR] encryption to your shell
- Privilege escalation on windows with practical example
- Export your python script into EXE
- You’ll get answers to your questions!
- You will setup your home virtual hacking lab
- You will learn countermeasures against most of the attacks
- Challenge yourself with UNSOLVED Exercises
Who This Book Is For
Ethical hackers and penetration testers, Students preparing for OSCP, OSCE, GPEN, GXPN, CEH, Information security professionals and cyber security consultants, System and network security administrators, Programmers who want to get their hands dirty
Table of Contents
Chapter 1. Warming up!; Your First Antivirus-Free Persistence Shell
Chapter 2. Advanced Scriptable Shell
Chapter 3. Password Hacking
Chapter 4. Catch Me If You Can!
Chapter 5. Miscellaneous Fun in Windows
Chapter 6. Abuse of Cryptography by Malware