Books & Videos

Table of Contents

  1. Chapter 1 Setting Up Your Python Environment

    1. Installing Kali Linux

    2. WingIDE

  2. Chapter 2 The Network: Basics

    1. Python Networking in a Paragraph

    2. TCP Client

    3. UDP Client

    4. TCP Server

    5. Replacing Netcat

    6. Building a TCP Proxy

    7. SSH with Paramiko

    8. SSH Tunneling

  3. Chapter 3 The Network: Raw Sockets and Sniffing

    1. Building a UDP Host Discovery Tool

    2. Packet Sniffing on Windows and Linux

    3. Decoding the IP Layer

    4. Decoding ICMP

  4. Chapter 4 Owning the Network with Scapy

    1. Stealing Email Credentials

    2. ARP Cache Poisoning with Scapy

    3. PCAP Processing

  5. Chapter 5 Web Hackery

    1. The Socket Library of the Web: urllib2

    2. Mapping Open Source Web App Installations

    3. Brute-Forcing Directories and File Locations

    4. Brute-Forcing HTML Form Authentication

  6. Chapter 6 Extending Burp Proxy

    1. Setting Up

    2. Burp Fuzzing

    3. Bing for Burp

    4. Turning Website Content into Password Gold

  7. Chapter 7 Github Command and Control

    1. Setting Up a GitHub Account

    2. Creating Modules

    3. Trojan Configuration

    4. Building a Github-Aware Trojan

  8. Chapter 8 Common Trojaning Tasks on Windows

    1. Keylogging for Fun and Keystrokes

    2. Taking Screenshots

    3. Pythonic Shellcode Execution

    4. Sandbox Detection

  9. Chapter 9 Fun with Internet Explorer

    1. Man-in-the-Browser (Kind Of)

    2. IE COM Automation for Exfiltration

  10. Chapter 10 Windows Privilege Escalation

    1. Installing the Prerequisites

    2. Creating a Process Monitor

    3. Windows Token Privileges

    4. Winning the Race

    5. Code Injection

  11. Chapter 11 Automating Offensive Forensics

    1. Installation

    2. Profiles

    3. Grabbing Password Hashes

    4. Direct Code Injection

  1. Updates