LDR | | 05182cmm u2200577Mi 4500 |
001 | | 000000313360 |
003 | | OCoLC |
005 | | 20230525154414 |
006 | | m d |
007 | | cr cnu---unuuu |
008 | | 180505s2018 enk o 000 0 eng d |
015 | |
▼a GBB882211
▼2 bnb |
016 | 7 |
▼a 018853900
▼2 Uk |
020 | |
▼a 9781788832465
▼q (electronic bk.) |
020 | |
▼a 1788832469
▼q (electronic bk.) |
035 | |
▼a 1801011
▼b (N$T) |
035 | |
▼a (OCoLC)1034612380 |
037 | |
▼a 9144B033-D47D-41BF-B742-6A53B316BFE3
▼b OverDrive, Inc.
▼n http://www.overdrive.com |
040 | |
▼a EBLCP
▼b eng
▼e pn
▼c EBLCP
▼d MERUC
▼d IDB
▼d CHVBK
▼d OCLCO
▼d OCLCF
▼d NLE
▼d TEFOD
▼d OCLCQ
▼d UKMGB
▼d LVT
▼d N$T
▼d 248032 |
049 | |
▼a MAIN |
050 | 4 |
▼a QA76.73.P98
▼b .K473 2018eb |
072 | 7 |
▼a COM
▼x 051360
▼2 bisacsh |
072 | 7 |
▼a COM
▼x 051330
▼2 bisacsh |
082 | 04 |
▼a 005.133
▼2 23 |
100 | 1 |
▼a Khrais, Hussam. |
245 | 10 |
▼a Python for Offensive PenTest :
▼b a practical guide to ethical hacking and penetration testing using Python. |
260 | |
▼a Birmingham :
▼b Packt Publishing,
▼c 2018. |
300 | |
▼a 1 online resource (169 pages) |
336 | |
▼a text
▼b txt
▼2 rdacontent |
337 | |
▼a computer
▼b c
▼2 rdamedia |
338 | |
▼a online resource
▼b cr
▼2 rdacarrier |
505 | 0 |
▼a Cover; Title Page; Copyright and Credits; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Warming up -- Your First Antivirus-Free Persistence Shell; Preparing the attacker machine; Setting up internet access; Preparing the target machine; TCP reverse shell; Coding a TCP reverse shell; Server side; Client side; Data exfiltration -- TCP; Server side; Client side; Exporting to EXE; HTTP reverse shell; Coding the HTTP reverse shell; Server side; Client side; Data exfiltration -- HTTP; Client side; Server side; Exporting to EXE; Persistence; Making putty.exe persistent. |
505 | 8 |
▼a Making a persistent HTTP reverse shellTuning the connection attempts; Tips for preventing a shell breakdown; Countermeasures; Summary; Chapter 2: Advanced Scriptable Shell; Dynamic DNS; DNS aware shell; Interacting with Twitter; Parsing a tweet in three lines; Countermeasures; Replicating Metasploit's screen capturing; Replicating Metasploit searching for content; Target directory navigation; Integrating low-level port scanner; Summary; Chapter 3: Password Hacking; Antivirus free keylogger; Installing pyHook and pywin; Adding code to keylogger; Hijacking KeePass password manager. |
505 | 8 |
▼a Man in the browserFirefox process; Firefox API hooking with Immunity Debugger; Python in Firefox proof of concept (PoC); Python in Firefox EXE; Dumping saved passwords out of Google Chrome; Acquiring the password remotely; Submitting the recovered password over HTTP session; Testing the file against antivirus; Password phishing -- DNS poisoning; Using Python script; Facebook password phishing; Countermeasures; Securing the online account; Securing your computer; Securing your network; Keeping a watch on any suspicious activity; Summary; Chapter 4: Catch Me If You Can! |
505 | 8 |
▼a Bypassing host-based firewallsHijacking IE; Bypassing reputation filtering in next generation firewalls; Interacting with SourceForge; Interacting with Google Forms; Bypassing botnet filtering; Bypassing IPS with handmade XOR encryption; Summary; Chapter 5: Miscellaneous Fun in Windows; Privilege escalation -- weak service file; Privilege escalation -- preparing vulnerable software; Privilege escalation -- backdooring legitimate windows service; Privilege escalation -- creating a new admin account and covering the tracks; Summary; Chapter 6: Abuse of Cryptography by Malware. |
505 | 8 |
▼a Introduction to encryption algorithmsProtecting your tunnel with AES -- stream mode; Cipher Block Chaining (CBC) mode encryption; Counter (CTR) mode encryption ; Protecting your tunnel with RSA; Hybrid encryption key; Summary; Other Books You May Enjoy; Index. |
520 | |
▼a Python is an easy-to-learn and cross-platform programming language which has unlimited third-party libraries. Plenty of open source hacking tools are written in Python and can be easily integrated within your script. This book is divided into clear bite-size chunks so you can learn at your own pace and focus on the areas of most interest to ... |
588 | 0 |
▼a Print version record. |
590 | |
▼a Master record variable field(s) change: 072, 650 |
650 | 0 |
▼a Python (Computer program language) |
650 | 0 |
▼a Penetration testing (Computer security) |
650 | 0 |
▼a Application software
▼x Testing. |
650 | 7 |
▼a COMPUTERS / Programming Languages / Python.
▼2 bisacsh |
650 | 7 |
▼a COMPUTERS / Software Development & Engineering / Quality Assurance & Testing.
▼2 bisacsh |
650 | 7 |
▼a Application software
▼x Testing.
▼2 fast
▼0 (OCoLC)fst00811716 |
655 | 4 |
▼a Electronic books. |
776 | 08 |
▼i Print version:
▼a Khrais, Hussam.
▼t Python for Offensive PenTest : A practical guide to ethical hacking and penetration testing using Python.
▼d Birmingham : Packt Publishing, 짤2018 |
856 | 40 |
▼3 EBSCOhost
▼u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=1801011 |
938 | |
▼a EBL - Ebook Library
▼b EBLB
▼n EBL5371678 |
938 | |
▼a EBSCOhost
▼b EBSC
▼n 1801011 |
990 | |
▼a 관리자 |
994 | |
▼a 92
▼b N$T |