| Карточка | Таблица | RUSMARC | |
| Khrais, Hussam. Python for Offensive PenTest: a practical guide to ethical hacking and penetration testing using Python. — Birmingham: Packt Publishing, 2018. — 1 online resource (169 pages) — <URL:http://elib.fa.ru/ebsco/1801011.pdf>.Дата создания записи: 05.05.2018 Тематика: Python (Computer program language); Penetration testing (Computer security); Application software — Testing.; COMPUTERS / Programming Languages / Python.; COMPUTERS / Software Development & Engineering / Quality Assurance & Testing.; Application software — Testing. Коллекции: EBSCO Разрешенные действия: – 
                
                  Действие 'Прочитать' будет доступно, если вы выполните вход в систему или будете работать с сайтом на компьютере в другой сети
                
                
                  Действие 'Загрузить' будет доступно, если вы выполните вход в систему или будете работать с сайтом на компьютере в другой сети
                
             Группа: Анонимные пользователи Сеть: Интернет | 
Аннотация
Python is an easy-to-learn and cross-platform programming language which has unlimited third-party libraries. Plenty of open source hacking tools are written in Python and can be easily integrated within your script. This book is divided into clear bite-size chunks so you can learn at your own pace and focus on the areas of most interest to ...
Права на использование объекта хранения
| Место доступа | Группа пользователей | Действие | ||||
|---|---|---|---|---|---|---|
| Локальная сеть Финуниверситета | Все |       | ||||
| Интернет | Читатели |     | ||||
|   | Интернет | Анонимные пользователи | 
Оглавление
- Cover
- Title Page
- Copyright and Credits
- Packt Upsell
- Contributors
- Table of Contents
- Preface
- Chapter 1: Warming up – Your First Antivirus-Free Persistence Shell- Preparing the attacker machine- Setting up internet access
 
- Preparing the target machine
- TCP reverse shell- Coding a TCP reverse shell- Server side
- Client side
 
- Data exfiltration – TCP- Server side
- Client side
 
- Exporting to EXE
 
- Coding a TCP reverse shell
- HTTP reverse shell- Coding the HTTP reverse shell- Server side
- Client side
 
- Data exfiltration – HTTP- Client side
- Server side
 
- Exporting to EXE
 
- Coding the HTTP reverse shell
- Persistence- Making putty.exe persistent
- Making a persistent HTTP reverse shell
 
- Tuning the connection attempts
- Tips for preventing a shell breakdown
- Countermeasures
- Summary
 
- Preparing the attacker machine
- Chapter 2: Advanced Scriptable Shell- Dynamic DNS- DNS aware shell
 
- Interacting with Twitter- Parsing a tweet in three lines
- Countermeasures
 
- Replicating Metasploit's screen capturing
- Replicating Metasploit searching for content- Target directory navigation
 
- Integrating low-level port scanner
- Summary
 
- Dynamic DNS
- Chapter 3: Password Hacking- Antivirus free keylogger- Installing pyHook and pywin
- Adding code to keylogger
 
- Hijacking KeePass password manager
- Man in the browser- Firefox process
 
- Firefox API hooking with Immunity Debugger
- Python in Firefox proof of concept (PoC)
- Python in Firefox EXE
- Dumping saved passwords out of Google Chrome- Acquiring the password remotely
 
- Submitting the recovered password over HTTP session- Testing the file against antivirus
 
- Password phishing – DNS poisoning- Using Python script
 
- Facebook password phishing
- Countermeasures- Securing the online account
- Securing your computer
- Securing your network
- Keeping a watch on any suspicious activity
 
- Summary
 
- Antivirus free keylogger
- Chapter 4: Catch Me If You Can!- Bypassing host-based firewalls- Hijacking IE
 
- Bypassing reputation filtering in next generation firewalls- Interacting with SourceForge
- Interacting with Google Forms
 
- Bypassing botnet filtering- Bypassing IPS with handmade XOR encryption
 
- Summary
 
- Bypassing host-based firewalls
- Chapter 5: Miscellaneous Fun in Windows- Privilege escalation – weak service file
- Privilege escalation – preparing vulnerable software
- Privilege escalation – backdooring legitimate windows service
- Privilege escalation – creating a new admin account and covering the tracks
- Summary
 
- Chapter 6: Abuse of Cryptography by Malware- Introduction to encryption algorithms
- Protecting your tunnel with AES – stream mode- Cipher Block Chaining (CBC) mode encryption
- Counter (CTR) mode encryption
 
- Protecting your tunnel with RSA
- Hybrid encryption key
- Summary
 
- Other Books You May Enjoy
- Index
Статистика использования
|  | Количество обращений: 0 За последние 30 дней: 0 Подробная статистика | 
 
      