Book description
Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker’s tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus.
- Demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts
- Write code to intercept and analyze network traffic using Python. Craft and spoof wireless frames to attack wireless and Bluetooth devices
- Data-mine popular social media websites and evade modern anti-virus
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright
- Trade marks
- Acknowledgements
- Dedication
- Lead Author – TJ O’Connor
- Contributing Author Bio – Rob Frost
- Technical Editor Bio – Mark Baggett
- Introduction
- Chapter 1. Introduction
- Chapter 2. Penetration Testing with Python
-
Chapter 3. Forensic Investigations with Python
- Introduction: How Forensics Solved the BTK Murders
- Where Have You Been?—Analysis of Wireless Access Points in the Registry
- Using Python to Recover Deleted Items in the Recycle Bin
- Metadata
- Investigating Application Artifacts with Python
- Investigating iTunes Mobile Backups with Python
- Chapter Wrap-Up
- References
-
Chapter 4. Network Traffic Analysis with Python
- Introduction: Operation Aurora and How the Obvious was Missed
- Where is that IP Traffic Headed?—A Python Answer
- Is Anonymous Really Anonymous? Analyzing LOIC Traffic
- How H D Moore Solved the Pentagon’s Dilemma
- Storm’s Fast-Flux and Conficker’s Domain-Flux
- Kevin Mitnick and TCP Sequence Prediction
- Foiling Intrusion Detection Systems with Scapy
- Chapter Wrap Up
- References
-
Chapter 5. Wireless Mayhem with Python
- Introduction: Wireless (IN)Security and the Iceman
- Setting up Your Wireless Attack Environment
- The Wall of Sheep—Passively Listening to Wireless Secrets
- Where Has Your Laptop Been? Python Answers
- Intercepting and Spying on UAVs with Python
- Detecting FireSheep
- Stalking with Bluetooth and Python
- Chapter Wrap Up
- References
- Chapter 6. Web Recon with Python
- Chapter 7. Antivirus Evasion with Python
- Index
Product information
- Title: Violent Python
- Author(s):
- Release date: December 2012
- Publisher(s): Syngress
- ISBN: 9781597499644
You might also like
book
Python Workout
The only way to master a skill is to practice. In Python Workout, author Reuven M. …
book
Python One-Liners
Python One-Liners will teach you how to read and write “one-liners”: concise statements of useful functionality …
book
Python Distilled
Expert Insight for Modern Python (3.6+) Development from the Author of Python Essential Reference The richness …
book
Black Hat Python
When it comes to creating powerful and effective hacking tools, Python is the language of choice …