You are previewing Violent Python.

Violent Python

Cover of Violent Python by TJ O'Connor Published by Elsevier Science, Syngress
  1. Cover image
  2. Title page
  3. Table of Contents
  4. Copyright
  5. Trade marks
  6. Acknowledgements
  7. Dedication
  8. Lead Author – TJ O’Connor
  9. Contributing Author Bio – Rob Frost
  10. Technical Editor Bio – Mark Baggett
  11. Introduction
    1. TARGET AUDIENCE
    2. ORGANIZATION OF THE BOOK
    3. COMPANION WEB SITE
  12. Chapter 1. Introduction
    1. Introduction: A Penetration Test with Python
    2. Setting Up Your Development Environment
    3. The Python Language
    4. Your First Python Programs
    5. Chapter Wrap-Up
    6. References
  13. Chapter 2. Penetration Testing with Python
    1. Introduction: The Morris Worm—Would it Work Today?
    2. Building a Port Scanner
    3. Building an SSH BotNet with Python
    4. Mass Compromise by Bridging FTP and Web
    5. Conficker, Why Trying Hard is Always Good Enough
    6. Writing Your Own Zero-Day Proof of Concept Code
    7. Chapter Wrap Up
    8. References
  14. Chapter 3. Forensic Investigations with Python
    1. Introduction: How Forensics Solved the BTK Murders
    2. Where Have You Been?—Analysis of Wireless Access Points in the Registry
    3. Using Python to Recover Deleted Items in the Recycle Bin
    4. Metadata
    5. Investigating Application Artifacts with Python
    6. Investigating iTunes Mobile Backups with Python
    7. Chapter Wrap-Up
    8. References
  15. Chapter 4. Network Traffic Analysis with Python
    1. Introduction: Operation Aurora and How the Obvious was Missed
    2. Where is that IP Traffic Headed?—A Python Answer
    3. Is Anonymous Really Anonymous? Analyzing LOIC Traffic
    4. How H D Moore Solved the Pentagon’s Dilemma
    5. Storm’s Fast-Flux and Conficker’s Domain-Flux
    6. Kevin Mitnick and TCP Sequence Prediction
    7. Foiling Intrusion Detection Systems with Scapy
    8. Chapter Wrap Up
    9. References
  16. Chapter 5. Wireless Mayhem with Python
    1. Introduction: Wireless (IN)Security and the Iceman
    2. Setting up Your Wireless Attack Environment
    3. The Wall of Sheep—Passively Listening to Wireless Secrets
    4. Where Has Your Laptop Been? Python Answers
    5. Intercepting and Spying on UAVs with Python
    6. Detecting FireSheep
    7. Stalking with Bluetooth and Python
    8. Chapter Wrap Up
    9. References
  17. Chapter 6. Web Recon with Python
    1. Introduction: Social Engineering Today
    2. Using the Mechanize Library to Browse the Internet
    3. Scraping Web Pages with AnonBrowser
    4. Research, Investigate, Discovery
    5. Anonymous Email
    6. Mass Social Engineering
    7. Chapter Wrap-Up
    8. References
  18. Chapter 7. Antivirus Evasion with Python
    1. Introduction: Flame On!
    2. Evading Antivirus Programs
    3. Verifying Evasion
    4. Wrap Up
    5. References
  19. Index
O'Reilly logo

Chapter 2

Penetration Testing with Python

Information in this chapter:

ent Building a Port Scanner

ent Constructing an SSH Botnet

ent Mass Compromise with FTP

ent Replicate Conficker

ent Your Own Zero Day Attack

To be a warrior is not a simple matter of wishing to be one. ...

The best content for your career. Discover unlimited learning on demand for around $1/day.