Beginning Ethical Hacking with Python (eBook)
XIX, 201 Seiten
Apress (Verlag)
978-1-4842-2541-7 (ISBN)
Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set you up with a foundation that will help you understand the advanced concepts of hacking in the future. Learn Ethical Hacking with Python 3 touches the core issues of cyber security: in the modern world of interconnected computers and the Internet, security is increasingly becoming one of the most important features of programming.
Ethical hacking is closely related to Python. For this reason this book is organized in three parts. The first part deals with the basics of ethical hacking; the second part deals with Python 3; and the third part deals with more advanced features of ethical hacking.
- Discover the legal constraints of ethical hacking
- Work with virtual machines and virtualization
- Develop skills in Python 3
- See the importance of networking in ethical hacking
- Gain knowledge of the dark web, hidden Wikipedia, proxy chains, virtual private networks, MAC addresses, and more
Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set you up with a foundation that will help you understand the advanced concepts of hacking in the future. Learn Ethical Hacking with Python 3 touches the core issues of cyber security: in the modern world of interconnected computers and the Internet, security is increasingly becoming one of the most important features of programming. Ethical hacking is closely related to Python. For this reason this book is organized in three parts. The first part deals with the basics of ethical hacking; the second part deals with Python 3; and the third part deals with more advanced features of ethical hacking.What You Will LearnDiscover the legal constraints of ethical hacking Work with virtual machines and virtualization Develop skills in Python 3See the importance of networking in ethical hackingGain knowledge of the dark web, hidden Wikipedia, proxy chains, virtual private networks, MAC addresses, and moreWho This Book Is ForBeginners wanting to learn ethical hacking alongside a modular object oriented programming language.
Sanjib Sinha writes stories and codes - not in the same order always. He started with C# and .NET framework and won the Microsoft Community Contributor Award in 2011. Later the Open Source Software movement attracted him and he became Linux, PHP and Python enthusiast, specializing in and working on White Hat Ethical Hacking.As a beginner he had to struggled a lot to find an easier way to learn coding. No one told him that coding is like writing - imagining a concept and making it a reality with the help of words and symbols. All through his books he has tried to help the beginners from their own perspectives.
Contents at a Glance 5
Contents 7
About the Author 11
About the Technical Reviewer 12
Acknowledgments 13
Prologue – Hacker’s Goal 14
PartI 17
Chapter 1: Legal Side of Hacking 18
Chapter 2: Hacking Environment 19
Ethical Hacking and Networking 20
What Does Network Mean? 20
Summary 22
Chapter 3: Installing Virtual Box 23
Chapter 4: Installing Kali Linux and Other Operating Systems on VB 26
Chapter 5: Linux Terminal, Basic Commands 33
Summary 45
PartII 46
Chapter 6: Python 3 and Ethical Hacking 47
Chapter 7: Python Environment 49
Chapter 8: General Syntaxes 52
Create the main( ) function 52
Indentation and White Space 53
Commenting 55
Assigning Values 56
Chapter 9: Variables, Objects and Values 57
Using Numbers 60
String 62
What is Type and ID 64
Logical Values 67
Tuples And Lists. 68
Dictionary 71
Object 72
Chapter 10: Conditionals 75
Chapter 11: Loops 77
While Loops 77
For Loops 79
Chapter 12: Regular Expressions 82
Using “re” Module 82
Reusing With Regular Expressions 84
Searching with Regular Expressions 85
Chapter 13: Exceptions, Catching Errors 88
Chapter 14: Functions 91
Return Values 96
Generate Functions 96
Lists of Arguments 99
Named Arguments 100
Chapter 15: Classes 102
Object-Oriented Methodology 102
The Foundation of Object Orientation 102
Understanding Classes and Objects 103
Write Your Own Game, “Good Vs Bad” 107
Primary Class and Object 111
Accessing Object Data 116
Polymorphism 119
Using Generators 121
Inheritance 122
Decorator 124
Chapter 16: String Methods 126
Chapter 17: File Input And Output 132
Chapter 18: Containers 134
Operating on Tuple and List Object 135
Operating on Dictionary Object 140
Chapter 19: Database 142
Let us start with SQLite3. 142
MySQL for Big Project 143
Chapter 20: Module 153
Chapter 21: Debugging, Unittest Module 157
Chapter 22: Socket and Networking 161
Chapter 23: Importing Nmap Module 162
Chapter 24: Building an Nmap Network Scanner 167
PartIII 171
Chapter 25: Protect Anonymity on the Internet 172
Chapter 26: Dark Web and Tor 173
Hidden Wikipedia 174
Chapter 27: Proxy Chains 178
Chapter 28: Virtual Private Network or VPN 183
Chapter 29: MAC Address 188
Epilogue—What Next 192
Index 193
Erscheint lt. Verlag | 25.12.2016 |
---|---|
Zusatzinfo | XIX, 201 p. 22 illus. in color. |
Verlagsort | Berkeley |
Sprache | englisch |
Themenwelt | Informatik ► Programmiersprachen / -werkzeuge ► Python |
Informatik ► Theorie / Studium ► Kryptologie | |
Schlagworte | beginnerguide • Encryption • ethicalhacking • Hacking • Python • python3 • security |
ISBN-10 | 1-4842-2541-4 / 1484225414 |
ISBN-13 | 978-1-4842-2541-7 / 9781484225417 |
Haben Sie eine Frage zum Produkt? |
Größe: 3,8 MB
DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasserzeichen und ist damit für Sie personalisiert. Bei einer missbräuchlichen Weitergabe des eBooks an Dritte ist eine Rückverfolgung an die Quelle möglich.
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.
Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich