Home Books Understanding Network Hacks Attack and Defense with Python free Download

Understanding Network Hacks Attack and Defense with Python free Download

484
0
SHARE

If you are interested to learn Hacking with Python and want to learn defence against Python then this book “Understanding Network Hacks Attack and Defense with Python” for you.

Hacking!

Hacking is a word which the world thinks illegitimate. However, that is not true. A person who hacks doesn’t necessarily have to be a thief. As long as it is harmless, hacking is fun.

Click on Download Button to get google Drive Link to Download your Book in Pdf.

Understanding Network Hacks Attack and Defense with Python

Download Now

 

About the Author

Author: Bastian Ballmann

Table of Content

Contents
1 Installation
1.1 The Right Operating System
1.2 The Right Python Version
1.3 Development Environment
1.4 Python Modules
2 Network 4 Newbies
2.1 Components
2.2 Topologies
2.3 ISO/OSI Layer Model
2.4 Ethernet
2.5 VLAN
2.6 ARP
2.7 IP
2.8 ICMP
2.9 TCP
2.10 UDP
2.11 An Example Network
2.12 Architecture
2.13 Gateway
2.14 Router
2.15 Bridge
2.16 Proxies
2.17 Virtual Private Networks
2.18 Firewalls
2.19 Man-in-the-Middle-Attacks
3 Python Basics
3.1 Every Start Is Simple

3.2 The Python Philosophy
3.3 Data Types
3.4 Data Structures
3.5 Functions
3.6 Control Structures
3.7 Modules
3.8 Exceptions
3.9 Regular Expressions
3.10 Sockets
4 Layer 2 Attacks
4.1 Required Modules
4.2 ARP-Cache-Poisoning
4.3 ARP-Watcher
4.4 MAC-Flooder
4.5 VLAN Hopping
4.6 Let’s Play Switch
4.7 ARP Spoofing Over VLAN Hopping
4.8 DTP Abusing
4.9 Tools
4.9.1 NetCommander
4.9.2 Hacker’s Hideaway ARP Attack Tool
4.9.3 Loki
5 TCP/IP Tricks
5.1 Required Modules
5.2 A Simple Sniffer
5.3 Reading and Writing PCAP Dump Files
5.4 Password Sniffer
5.5 Sniffer Detection
5.6 IP-Spoofing

5.7 SYN-Flooder
5.8 Port-Scanning
5.9 Port-Scan Detection
5.10 ICMP-Redirection
5.11 RST Daemon
5.12 Automatic Hijack Daemon
5.13 Tools
5.13.1 Scapy
6 WHOIS DNS?
6.1 Protocol Overview
6.2 Required Modules
6.3 Questions About Questions
6.4 WHOIS
6.5 DNS Dictionary Mapper
6.6 Reverse DNS Scanner
6.7 DNS-Spoofing
6.8 Tools
6.8.1 Chaosmap
7 HTTP Hacks
7.1 Protocol Overview
7.2 Web Services
7.3 Required Modules
7.4 HTTP Header Dumper
7.5 Referer Spoofing
7.6 The Manipulation of Cookies
7.7 HTTP-Auth Sniffing
7.8 Webserver Scanning
7.9 SQL Injection
7.10 Command Injection
7.11 Cross-Site-Scripting
7.12 SSL Sniffing
7.13 Proxy Scanner
7.14 Proxy Port Scanner
7.15 Tools
7.15.1 SSL Strip
7.15.2 Cookie Monster
7.15.3 Sqlmap
7.15.4 W3AF
8 Wifi Fun
8.1 Protocol Overview
8.2 Required Modules 8.3 Wifi Scanner
8.4 Wifi Sniffer
8.5 Probe-Request Sniffer
8.6 Hidden SSID
8.7 MAC-Address-Filter
8.8 WEP
8.9 WPA
8.10 WPA2 8.11 Wifi-Packet-Injection
8.12 Playing Wifi Client
8.13 Deauth
8.14 Wifi Man-in-the-Middle
8.15 Wireless Intrusion Detection 8.16 Tools
8.16.1 WiFuzz
8.16.2 Pyrit
8.16.3 AirXploit
9 Feeling Bluetooth on the Tooth
9.1 Protocol Overview
9.2 Required Modules
9.3 Bluetooth-Scanner
9.4 SDP-Browser
9.5 RFCOMM-Channel-Scanner
9.6 OBEX
9.7 Blue Snarf Exploit
9.8 Blue Bug Exploit
9.9 Bluetooth-Spoofing
9.10 Sniffing
9.11 Tools 9.11.1 BlueMaho
10 Bargain Box Kung Fu
10.1 Required Modules
10.2 Spoofing E-mail Sender
10.3 DHCP Hijack
10.4 IP Brute Forcer
10.5 Google-Hacks-Scanner
10.6 SMB-Share-Scanner
10.7 Login Watcher A Scapy Reference
A.1 Protocols
A.2 Functions
B Secondary Links
Index

Click on Download Button to get google Drive Link to Download your Book Understanding Network Hacks Attack and Defense with Python in Pdf.

 

Download Now

 

Want More Hacking Videos, Tutorials, Tips ,Books and Software then Click Here.

Want To order your Book in Hard copy Then Click on Link I am sharing with you.

Link 1

 

 

LEAVE A REPLY

Please enter your comment!
Please enter your name here