Table of Contents for
Python: Penetration Testing for Developers
Close
Version ebook
/
Retour
Python: Penetration Testing for Developers
by Dave Mound
Published by Packt Publishing, 2016
Cover
Table of Contents
Python: Penetration Testing for Developers
Python: Penetration Testing for Developers
Python: Penetration Testing for Developers
Credits
Preface
What you need for this learning path
Who this learning path is for
Reader feedback
Customer support
1. Module 1
1. Understanding the Penetration Testing Methodology
Understanding what penetration testing is not
Assessment methodologies
The penetration testing execution standard
Penetration testing tools
Summary
2. The Basics of Python Scripting
Python – the good and the bad
A Python interactive interpreter versus a script
Environmental variables and PATH
Understanding dynamically typed languages
The first Python script
Developing scripts and identifying errors
Python formatting
Python variables
Operators
Compound statements
Functions
The Python style guide
Arguments and options
Your first assessor script
Summary
3. Identifying Targets with Nmap, Scapy, and Python
Understanding Nmap
Nmap libraries for Python
The Scapy library for Python
Summary
4. Executing Credential Attacks with Python
Identifying the target
Creating targeted usernames
Testing for users using SMTP VRFY
Summary
5. Exploiting Services with Python
Understanding the chaining of exploits
Automating the exploit train with Python
Summary
6. Assessing Web Applications with Python
Identifying hidden files and directories with Python
Credential attacks with Burp Suite
Using twill to walk through the source
Understanding when to use Python for web assessments
Summary
7. Cracking the Perimeter with Python
Understanding the link between accounts and services
Cracking inboxes with Burp Suite
Identifying the attack path
Gaining access through websites
Summary
8. Exploit Development with Python, Metasploit, and Immunity
Understanding the Windows memory structure
Understanding memory addresses and endianness
Understanding the manipulation of the stack
Understanding immunity
Understanding basic buffer overflow
Writing a basic buffer overflow exploit
Understanding stack adjustments
Understanding the purpose of local exploits
Understanding other exploit scripts
Reversing Metasploit modules
Understanding protection mechanisms
Summary
9. Automating Reports and Tasks with Python
Understanding how to create a Python class
Summary
10. Adding Permanency to Python Tools
Understanding the difference between multithreading and multiprocessing
Building industry-standard tools
Summary
2. Module 2
1. Python with Penetration Testing and Networking
Approaches to pentesting
Introducing Python scripting
Understanding the tests and tools you'll need
Learning the common testing platforms with Python
Network sockets
Server socket methods
Client socket methods
General socket methods
Moving on to the practical
Summary
2. Scanning Pentesting
What are the services running on the target machine?
Summary
3. Sniffing and Penetration Testing
Implementing a network sniffer using Python
Learning about packet crafting
Introducing ARP spoofing and implementing it using Python
Testing the security system using custom packet crafting and injection
Summary
4. Wireless Pentesting
Wireless attacks
Summary
5. Foot Printing of a Web Server and a Web Application
Introducing information gathering
Information gathering of a website from SmartWhois by the parser BeautifulSoup
Banner grabbing of a website
Hardening of a web server
Summary
6. Client-side and DDoS Attacks
Tampering with the client-side parameter with Python
Effects of parameter tampering on business
Introducing DoS and DDoS
Summary
7. Pentesting of SQLI and XSS
Types of SQL injections
Understanding the SQL injection attack by a Python script
Learning about Cross-Site scripting
Summary
3. Module 3
1. Gathering Open Source Intelligence
Gathering information using the Shodan API
Scripting a Google+ API search
Downloading profile pictures using the Google+ API
Harvesting additional results from the Google+ API using pagination
Getting screenshots of websites with QtWebKit
Screenshots based on a port list
Spidering websites
2. Enumeration
Performing a ping sweep with Scapy
Scanning with Scapy
Checking username validity
Brute forcing usernames
Enumerating files
Brute forcing passwords
Generating e-mail addresses from names
Finding e-mail addresses from web pages
Finding comments in source code
3. Vulnerability Identification
Automated URL-based Directory Traversal
Automated URL-based Cross-site scripting
Automated parameter-based Cross-site scripting
Automated fuzzing
jQuery checking
Header-based Cross-site scripting
Shellshock checking
4. SQL Injection
Checking jitter
Identifying URL-based SQLi
Exploiting Boolean SQLi
Exploiting Blind SQL Injection
Encoding payloads
5. Web Header Manipulation
Testing HTTP methods
Fingerprinting servers through HTTP headers
Testing for insecure headers
Brute forcing login through the Authorization header
Testing for clickjacking vulnerabilities
Identifying alternative sites by spoofing user agents
Testing for insecure cookie flags
Session fixation through a cookie injection
6. Image Analysis and Manipulation
Hiding a message using LSB steganography
Extracting messages hidden in LSB
Hiding text in images
Extracting text from images
Enabling command and control using steganography
7. Encryption and Encoding
Generating an MD5 hash
Generating an SHA 1/128/256 hash
Implementing SHA and MD5 hashes together
Implementing SHA in a real-world scenario
Generating a Bcrypt hash
Cracking an MD5 hash
Encoding with Base64
Encoding with ROT13
Cracking a substitution cipher
Cracking the Atbash cipher
Attacking one-time pad reuse
Predicting a linear congruential generator
Identifying hashes
8. Payloads and Shells
Extracting data through HTTP requests
Creating an HTTP C2
Creating an FTP C2
Creating an Twitter C2
Creating a simple Netcat shell
9. Reporting
Converting Nmap XML to CSV
Extracting links from a URL to Maltego
Extracting e-mails to Maltego
Parsing Sslscan into CSV
Generating graphs using plot.ly
A. Bibliography
Index
Next
Next Chapter
Table of Contents
Next
Next Chapter
Table of Contents