Publication Date: November 22, 2012 | ISBN-10: 1597499579 | ISBN-13: 978-1597499576 | Edition: 1
Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker's tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus.
- Demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts.
- Write code to intercept and analyze network traffic using Python. Craft and spoof wireless frames to attack wireless and Bluetooth devices.
- Data-mine popular social media websites and evade modern anti-virus.
CONTENTS
Introduction:
A Penetration Test
with Python .................1
Setting Up Your
Development
Environment ................2
Installing Third Party
Libraries .............................3
Interpreted Python
Versus Interactive
Python .................................5
The Python
Language .....................6
Variables .............................7
Strings .................................7
Lists ....................................8
Dictionaries ........................9
Networking ........................9
Selection ...........................10
Exception Handling .........10
Functions ..........................12
Iteration ............................14
File I/O ..............................16
Sys Module .......................17
OS Module ........................18
Your First Python
Programs ...................20
Setting the Stage for
Your First Python
Program:
The Cuckoo’s Egg ............20
Your First Program, a
UNIX Password
Cracker .............................21
Setting the Stage for
Your Second Program:
Using Evil for Good ..........24
Your Second Program,
a Zip-File Password
Cracker .............................24
Chapter Wrap-Up ......29
References .................29