没有合适的资源?快使用搜索试试~ 我知道了~
首页Python Network Hacking Essentials 无水印pdf
Python Network Hacking Essentials 无水印pdf
需积分: 9 89 浏览量
更新于2023-03-16
评论
收藏 3.76MB PDF 举报
Python Network Hacking Essentials 英文无水印pdf pdf所有页面使用FoxitReader和PDF-XChangeViewer测试都可以打开 本资源转载自网络,如有侵权,请联系上传者或csdn删除 本资源转载自网络,如有侵权,请联系上传者或csdn删除
资源详情
资源评论
资源推荐

Python Network Hacking
Essentials
Earnest Wish, Leo

Copyright © 2015 Earnest Wish, Leo
All rights reserved.
ISBN: 1511797568
ISBN-13: 978-1511797566

ABOUT THE AUTHORS
Earnest Wish
Earnest Wish has 15 years of experience as an information security
professional and a white hacker. He developed the internet stock
trading system at Samsung SDS at the beginning of his IT career,
and he gained an extensive amount experience in hacking and
security while operating the Internet portal system at KTH (Korea
Telecom Hitel). He is currently responsible for privacy and
information security work in public institutions and has deep
knowledge with respect to vulnerability assessments, programming
and penetration testing. He obtained the Comptia Network +
Certification and the license of Professional Engineer for Computer
System Applications. This license is provided by the Republic of
Korea to leading IT Professionals.
Leo
Leo is a computer architect and a parallel processing expert. He is
the author of six programming books. As a junior programmer, he
developed a billing system and a hacking tool prevention system in
China. In recent years, he has studied security vulnerability analysis
and the improvement in measures for parallel programming. Now,
he is a lead optimization engineer to improve CPU and GPU
performance.

CONTENTS IN DETAIL
Chapter 1 Preparation for Hacking 1
1.1 Starting Python 1
1.2. Basic Grammar 3
1.3 Functions 8
1.4 Class and Object 11
1.5 Exception Handling 14
1.6 Module 17
1.7 File Handling 21
1.8 String Format 25
Chapter 2 Network Hacking 28
2.1 Network Hacking Introduction 28
2.2 Configure a Test Environment 30
2.3 Vulnerability Analysis via Port Scanning 42
2.4 Stealing Credentials Using Packet Sniffing 58
2.5 Overview of a DoS Attack 66
2.6 DoS - Ping of Death 69
2.7 DoS - TCP SYN Flood 80
2.8 DoS - Slowloris Attack 96
Chapter 3 Conclusion 103

PREFACE
Target Audience
This book is not for professional hackers. Instead, this book is
made for beginners who have programming experience and are
interested in hacking. Here, hacking techniques that can be
easily understood have been described. If you only have a
home PC, you can test all the examples provided here. I have
included many figures that are intuitively understandable rather than
a litany of explanations. Therefore, it is possible to gain some
practical experience while hacking, since I have only used examples
that can actually be implemented. This book is therefore necessary
for ordinary people who have a curiosity of hackers and are
interested in computers.
Organization of the Book
This book is made up of five major parts, from basic knowledge to
actual hacking code. A beginner is naturally expected to become a
hacker while reading this book.
• Hacking Preparation
Briefly introduce the basic Python syntax that is necessary for
hacking.
• Network Hacking
A variety of tools and the Python language can be combined to
support network hacking and to introduce the network hacking
technique. Briefly, we introduce NMap with the Wireshark tool,
and hacking techniques such as Port Scanning, Packet Sniffing,
剩余111页未读,继续阅读














安全验证
文档复制为VIP权益,开通VIP直接复制

评论0