请选择 进入手机版 | 继续访问电脑版
楼主: fjac9713
2022 4

[书籍介绍] 新书Violent Python [推广有奖]

  • 3关注
  • 0粉丝

博士生

26%

还不是VIP/贵宾

-

威望
0
论坛币
16901 个
通用积分
299.1621
学术水平
20 点
热心指数
11 点
信用等级
17 点
经验
19206 点
帖子
31
精华
3
在线时间
63 小时
注册时间
2014-7-11
最后登录
2021-4-4

fjac9713 发表于 2014-7-30 12:47:09 |显示全部楼层

+2 论坛币
k人 参与回答

经管之家送您一份

应届毕业生专属福利!

求职就业群
赵安豆老师微信:zhaoandou666

经管之家联合CDA

送您一个全额奖学金名额~ !

感谢您参与论坛问题回答

经管之家送您两个论坛币!

+2 论坛币
书籍简介

Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker’s tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus.

- Demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts.

- Write code to intercept and analyze network traffic using Python. Craft and spoof wireless frames to attack wireless and Bluetooth devices.

- Data-mine popular social media websites and evade modern anti-virus.

Review
“When it comes to Python and penetration testing, TJ O’Connor is the grand Python master. This is the book that keeps on giving. From building penetration testing Python scripts, to antivirus-evading penetration testing malware, to interrogating the Windows Registry and investigating other forensic artifacts…O’Connor masterfully walks the reader from basic to advanced penetration testing techniques with sample code throughout.”

-Ove Carroll, SANS Certified Instructor, Co-Author of SANS Forensics 408 – Windows In Depth

“Violent Python is chalked full of practical examples and is for all security professionals. It covers the spectrum – knowledge for pen testers to forensic analysts, beginner to advanced and offensive to defensive tasks. If you are involved in information security and are looking for a Python book, this is an excellent source.”

-James Shewmaker, Security Analyst, Bluenotch Corporation

“The best hackers know when to write their own tools. Violent Python is a very relevant collection of examples to seed your personal hacking toolbox. From offensive actions to digital forensics, this book has useful bits for everyone.”

-Raphael Mudge, Creator of Armitage

About the Author

TJ O’Connor is a Department of Defense expert on information security and a US Army paratrooper. While assigned as an assistant professor at the US Military Academy, TJ taught undergraduate courses on forensics, exploitation and information assurance. He twice co-coached the winning team at the National Security Agency’s annual Cyber Defense Exercise and won the National Defense University’s first annual Cyber Challenge. He has served on multiple red teams, including twice on the Northeast Regional Team for the National Collegiate Cyber Defense Competition.

TJ holds a Master of Science degree in Computer Science from North Carolina State, a Master of Science degree in Information Security Engineering from the SANS Technical Institute, and a Bachelor of Science degree in Computer Science from the US Military Academy. He has published technical research at USENIX workshops, ACM conferences, security conferences, the SANS Reading Room, the Internet Storm Center, the Army Magazine, and the Armed Forces Journal. He holds expert cyber security credentials, including the prestigious GIAC Security Expert (GSE) and Offensive Security Certified Expert (OSCE). TJ is a member of the elite SANS Red and Blue Team Cyber Guardians.

Violent Python.pdf (7.83 MB, 需要: 5 个论坛币)



二维码

扫码加我 拉你入群

请注明:姓名-公司-职位

以便审核进群资格,未注明则拒绝

关键词:python viole OLE social media Professional computing practical concepts network another

本帖被以下文库推荐

stata SPSS
zsuphoenix 发表于 2014-7-30 14:31:41 |显示全部楼层
message received

使用道具

songlinjl 发表于 2014-7-30 15:50:59 来自手机 |显示全部楼层
zsuphoenix 发表于 2014-7-30 14:31
message received
kkkkkkk*kkkk

使用道具

Nicolle 学生认证  发表于 2015-9-1 10:36:26 |显示全部楼层
  1. Using the OS Module to Find Deleted Items
  2. To allow our script to remain independent of the operating system, let’s write a function to test each of the possible candidate directories and return the first one that exists on the system.

  3. import os

  4. def returnDir():

  5.   dirs=[‘C:\\Recycler\\’,‘C:\\Recycled\\’,‘C:\\$Recycle.Bin\\’]

  6.   for recycleDir in dirs:

  7.    if os.path.isdir(recycleDir):

  8.     return recycleDir

  9.   return None
复制代码

使用道具

Nicolle 学生认证  发表于 2015-9-1 10:38:32 |显示全部楼层
  1. Setting up Your Wireless Attack Environment
  2. In the following sections, we will write code to sniff wireless traffic and send raw 802.11 frames. We will use a Hawking Hi-Gain USB Wireless-150N Network Adapter with Range Amplifier (HAWNU1) to create and test the scripts in this chapter. The default drivers for this card on Backtrack 5 allow a user to place it into monitor mode as well as transmit raw frames. Additionally, it contains an external antenna connection that allows us to attach a high-powered antenna to the card.

  3. Our scripts require the ability to place the card into a monitor in order to passively listen for all wireless traffic. Monitor mode allows you to receive raw wireless frames rather than 802.11 Ethernet frames you typically get in Managed mode. This allows you to see beacons and the wireless management frames even if you are not associated with a network.

  4. Testing Wireless Capture with Scapy
  5. To place the card into monitor mode, we use the aircrack-ng suite of tools written by Thomas d’Otreppe. Iwconfig lists our wireless adapter as wlan0. Next, we run the command airmon-ng start wlan0 to start it into monitor mode. This creates a new adapter known as mon0.

  6. attacker# iwconfig wlan0

  7. wlan0 IEEE 802.11bgn ESSID:off/any

  8.    Mode:Managed Access Point: Not-Associated

  9.    Retry long limit:7 RTS thr:off Fragment thr:off

  10.    Encryption key:off

  11.    Power Management:on

  12. attacker# airmon-ng start wlan0

  13. Interface Chipset  Driver

  14. wlan0   Ralink   RT2870/3070  rt2800usb - [phy0]

  15.       (monitor mode enabled on mon0)

  16. Let’s quickly test that we can capture wireless traffic after placing the card into monitor mode. Notice that we set our conf.iface to the newly created monitoring interface, mon0. Upon hearing each packet, the script runs the procedure pktPrint(). This procedure prints a message if the packet contains an 802.11 Beacon, an 802.11 Probe Response, a TCP Packet, or DNS traffic.

  17. from scapy.all import ∗

  18. def pktPrint(pkt):

  19.   if pkt.haslayer(Dot11Beacon):

  20.    print ‘[+] Detected 802.11 Beacon Frame’

  21.   elif pkt.haslayer(Dot11ProbeReq):

  22.    print ‘[+] Detected 802.11 Probe Request Frame’

  23.   elif pkt.haslayer(TCP):

  24.    print ‘[+] Detected a TCP Packet’

  25.   elif pkt.haslayer(DNS):

  26.    print ‘[+] Detected a DNS Packet’

  27. conf.iface = ‘mon0’

  28. sniff(prn=pktPrint)
复制代码

使用道具

您需要登录后才可以回帖 登录 | 我要注册

京ICP备16021002-2号 京B2-20170662号 京公网安备 11010802022788号 论坛法律顾问:王进律师 知识产权保护声明   免责及隐私声明

GMT+8, 2021-10-17 14:59