توضیحاتی در مورد کتاب Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
نام کتاب : Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
عنوان ترجمه شده به فارسی : Violent Python: کتاب آشپزی برای هکرها، تحلیلگران پزشکی قانونی، تسترهای نفوذ و مهندسین امنیت
سری :
نویسندگان : TJ O'Connor
ناشر : Syngress
سال نشر : 2012
تعداد صفحات : 377
ISBN (شابک) : 1597499579 , 9781597499576
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 1 مگابایت
بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.
فهرست مطالب :
Title page
Table of Contents
Copyright
Trade marks
Acknowledgements
Dedication
Lead Author – TJ O’Connor
Contributing Author Bio – Rob Frost
Technical Editor Bio – Mark Baggett
Introduction
TARGET AUDIENCE
ORGANIZATION OF THE BOOK
COMPANION WEB SITE
Chapter 1. Introduction
Introduction: A Penetration Test with Python
Setting Up Your Development Environment
The Python Language
Your First Python Programs
Chapter Wrap-Up
References
Chapter 2. Penetration Testing with Python
Introduction: The Morris Worm—Would it Work Today?
Building a Port Scanner
Building an SSH BotNet with Python
Mass Compromise by Bridging FTP and Web
Conficker, Why Trying Hard is Always Good Enough
Writing Your Own Zero-Day Proof of Concept Code
Chapter Wrap Up
References
Chapter 3. Forensic Investigations with Python
Introduction: How Forensics Solved the BTK Murders
Where Have You Been?—Analysis of Wireless Access Points in the Registry
Using Python to Recover Deleted Items in the Recycle Bin
Metadata
Investigating Application Artifacts with Python
Investigating iTunes Mobile Backups with Python
Chapter Wrap-Up
References
Chapter 4. Network Traffic Analysis with Python
Introduction: Operation Aurora and How the Obvious was Missed
Where is that IP Traffic Headed?—A Python Answer
Is Anonymous Really Anonymous? Analyzing LOIC Traffic
How H D Moore Solved the Pentagon’s Dilemma
Storm’s Fast-Flux and Conficker’s Domain-Flux
Kevin Mitnick and TCP Sequence Prediction
Foiling Intrusion Detection Systems with Scapy
Chapter Wrap Up
References
Chapter 5. Wireless Mayhem with Python
Introduction: Wireless (IN)Security and the Iceman
Setting up Your Wireless Attack Environment
The Wall of Sheep—Passively Listening to Wireless Secrets
Where Has Your Laptop Been? Python Answers
Intercepting and Spying on UAVs with Python
Detecting FireSheep
Stalking with Bluetooth and Python
Chapter Wrap Up
References
Chapter 6. Web Recon with Python
Introduction: Social Engineering Today
Using the Mechanize Library to Browse the Internet
Scraping Web Pages with AnonBrowser
Research, Investigate, Discovery
Anonymous Email
Mass Social Engineering
Chapter Wrap-Up
References
Chapter 7. Antivirus Evasion with Python
Introduction: Flame On!
Evading Antivirus Programs
Verifying Evasion
Wrap Up
References
Index