MARC보기
LDR05223cam a2200577Mi 4500
001000000412257
00520190131143056
006m d
007cr cnu---unuuu
008180505s2018 enk o 000 0 eng d
015 ▼a GBB882211 ▼2 bnb
0167 ▼a 018853900 ▼2 Uk
020 ▼a 9781788832465 ▼q (electronic bk.)
020 ▼a 1788832469 ▼q (electronic bk.)
035 ▼a 1801011 ▼b (N$T)
035 ▼a (OCoLC)1034612380
037 ▼a 9144B033-D47D-41BF-B742-6A53B316BFE3 ▼b OverDrive, Inc. ▼n http://www.overdrive.com
040 ▼a EBLCP ▼b eng ▼e pn ▼c EBLCP ▼d MERUC ▼d IDB ▼d CHVBK ▼d OCLCO ▼d OCLCF ▼d NLE ▼d TEFOD ▼d OCLCQ ▼d UKMGB ▼d LVT ▼d N$T ▼d 247004
050 4 ▼a QA76.73.P98 ▼b .K473 2018eb
072 7 ▼a COM ▼x 051360 ▼2 bisacsh
072 7 ▼a COM ▼x 051330 ▼2 bisacsh
08204 ▼a 005.133 ▼2 23
1001 ▼a Khrais, Hussam.
24510 ▼a Python for Offensive PenTest : ▼b a practical guide to ethical hacking and penetration testing using Python.
260 ▼a Birmingham: ▼b Packt Publishing, ▼c 2018.
300 ▼a 1 online resource (169 pages).
336 ▼a text ▼b txt ▼2 rdacontent
337 ▼a computer ▼b c ▼2 rdamedia
338 ▼a online resource ▼b cr ▼2 rdacarrier
5050 ▼a Cover; Title Page; Copyright and Credits; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Warming up -- Your First Antivirus-Free Persistence Shell; Preparing the attacker machine; Setting up internet access; Preparing the target machine; TCP reverse shell; Coding a TCP reverse shell; Server side; Client side; Data exfiltration -- TCP; Server side; Client side; Exporting to EXE; HTTP reverse shell; Coding the HTTP reverse shell; Server side; Client side; Data exfiltration -- HTTP; Client side; Server side; Exporting to EXE; Persistence; Making putty.exe persistent.
5058 ▼a Making a persistent HTTP reverse shellTuning the connection attempts; Tips for preventing a shell breakdown; Countermeasures; Summary; Chapter 2: Advanced Scriptable Shell; Dynamic DNS; DNS aware shell; Interacting with Twitter; Parsing a tweet in three lines; Countermeasures; Replicating Metasploit's screen capturing; Replicating Metasploit searching for content; Target directory navigation; Integrating low-level port scanner; Summary; Chapter 3: Password Hacking; Antivirus free keylogger; Installing pyHook and pywin; Adding code to keylogger; Hijacking KeePass password manager.
5058 ▼a Man in the browserFirefox process; Firefox API hooking with Immunity Debugger; Python in Firefox proof of concept (PoC); Python in Firefox EXE; Dumping saved passwords out of Google Chrome; Acquiring the password remotely; Submitting the recovered password over HTTP session; Testing the file against antivirus; Password phishing -- DNS poisoning; Using Python script; Facebook password phishing; Countermeasures; Securing the online account; Securing your computer; Securing your network; Keeping a watch on any suspicious activity; Summary; Chapter 4: Catch Me If You Can!
5058 ▼a Bypassing host-based firewallsHijacking IE; Bypassing reputation filtering in next generation firewalls; Interacting with SourceForge; Interacting with Google Forms; Bypassing botnet filtering; Bypassing IPS with handmade XOR encryption; Summary; Chapter 5: Miscellaneous Fun in Windows; Privilege escalation -- weak service file; Privilege escalation -- preparing vulnerable software; Privilege escalation -- backdooring legitimate windows service; Privilege escalation -- creating a new admin account and covering the tracks; Summary; Chapter 6: Abuse of Cryptography by Malware.
5058 ▼a Introduction to encryption algorithmsProtecting your tunnel with AES -- stream mode; Cipher Block Chaining (CBC) mode encryption; Counter (CTR) mode encryption ; Protecting your tunnel with RSA; Hybrid encryption key; Summary; Other Books You May Enjoy; Index.
520 ▼a Python is an easy-to-learn and cross-platform programming language which has unlimited third-party libraries. Plenty of open source hacking tools are written in Python and can be easily integrated within your script. This book is divided into clear bite-size chunks so you can learn at your own pace and focus on the areas of most interest to ...
5880 ▼a Print version record.
590 ▼a Master record variable field(s) change: 072, 650
650 0 ▼a Python (Computer program language)
650 0 ▼a Penetration testing (Computer security)
650 0 ▼a Application software ▼x Testing.
650 7 ▼a COMPUTERS / Programming Languages / Python. ▼2 bisacsh
650 7 ▼a COMPUTERS / Software Development & Engineering / Quality Assurance & Testing. ▼2 bisacsh
650 7 ▼a Application software ▼x Testing. ▼2 fast ▼0 (OCoLC)fst00811716
655 4 ▼a Electronic books.
77608 ▼i Print version: ▼a Khrais, Hussam. ▼t Python for Offensive PenTest : A practical guide to ethical hacking and penetration testing using Python. ▼d Birmingham : Packt Publishing, 짤2018
85640 ▼3 EBSCOhost ▼u http://libproxy.dhu.ac.kr/_Lib_Proxy_Url/http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=1801011
938 ▼a EBL - Ebook Library ▼b EBLB ▼n EBL5371678
938 ▼a EBSCOhost ▼b EBSC ▼n 1801011
990 ▼a ***1012033
994 ▼a 92 ▼b N$T