Learn Penetration Testing with Python 3.x - 2nd Edition

Lessons
Lab
TestPrep
AI Tutor (Add-on)
Get A Free Trial

About This Course

Skills You’ll Get

1

Preface

2

Starting with Penetration Testing and Basic Python

  • Introduction
  • Introducing penetration testing
  • Penetration testing types
  • Penetration testing tools
  • The basics of Python 3
  • Python variables
  • Statements in Python 3
  • Operators in Python 3
  • Functions in Python 3
  • Classes, self, and destructors in Python 3
  • Conclusion
  • A programming challenge
  • Programming questions
3

Cracking with Python 3

  • Introduction
  • Types of crypto world
  • Types of credential attacks
  • Attacking passwords with Python
  • Conclusion
  • Programming challenge
4

Service and Applications Brute Forcing with Python

  • Introduction
  • Services brute forcing
  • SMTP brute forcing
  • FTP brute force attack
  • SSH brute force attack
  • Web broken authentication
  • Conclusion
  • Programming challenge
5

Python Services Identifications: Ports and Banner

  • Introduction
  • Deeper inside systems communication
  • Ethernet networks
  • Ethernet frames architecture
  • Wireless networks
  • IP packet architecture
  • TCP packet header
  • UDP packet header
  • TCP three-way handshake
  • Wireless four-way handshake
  • Services uncovered by Python
  • Socket library
  • Python port scanner
  • Python live host check
  • Python DNS
  • Conclusion
  • Programming challenge
6

Python Network Modules and Nmap

  • Introduction
  • Python Nmap
  • Python network modules
  • Understanding Scapy
  • Network discovery with Scapy
  • Fuzz method
  • TCP SYN-ACK ping methods
  • ARP ping method
  • Scapy UDP ping
  • Scapy traceroute
  • Scapy port scanner
  • Create custom packet
  • ICMP packet header
  • Conclusion
  • Programming challenge
7

Network Monitoring with Python

  • Introduction
  • Understanding network monitoring
  • Network monitoring and its importance
  • Understanding network tools
  • Security Operation Center
  • Network monitoring using socket library
  • Monitoring and analysis with SCAPY
  • Scapy HTTP monitoring
  • Scapy DNS monitoring
  • Conclusion
  • Programming challenge
8

Attacking Wireless with Python

  • Introduction
  • 802.11 packet headers
  • Wireless frequency and channels
  • Wireless BSSID and SSID and ESSID
  • Wireless encryption family
  • Wireless SSID using Scapy
  • Deauthentication using Python
  • Conclusion
  • Programming challenge
9

Analyze Web Applications with Python

  • Introduction
  • HTTP methods with Python
  • Python modules
  • Parsing URLs
  • Extracting cookies
  • Extracting images and documents
  • Images metadata
  • Hidden web directories
  • Conclusion
  • Programming challenge
10

Attacking Web Applications with Python

  • Introduction
  • Information gathering with Shodan
  • Cross-site trace
  • Identifying web application firewalls
  • Cross-site scripting
  • Open redirect with Python
  • Bypassing web application firewalls
  • Encoding your payload
  • Business logic vulnerabilities
  • Conclusion
  • Programming challenge
11

Exploit Development with Python

  • Introduction
  • Intel CPU architecture (x86)
  • General purpose registers
  • Special purpose registers
  • Segment registers
  • EFLAGS register
  • X64 registers
  • Windows memory structure
  • Big and little endian
  • Playing with the stack
  • Debugger tools
  • Immunity Debugger
  • Fuzzing
  • Basic buffer overflow
  • Removing bad characters
  • Building our exploit
  • Exploit development protections
  • Conclusion
  • Programming challenge
12

Forensics with Python

  • Introduction
  • File analysis
  • File metadata
  • Analyzing PDF files
  • Analyzing TXT files
  • Data visualization
  • Network forensics
  • Conclusion
  • Programming challenge
13

Python with Burp Suite

  • Introduction
  • Burp Suite features
  • Burp Suite extensions
  • Jython
  • Detecting misconfiguration
  • Cross-origin resource sharing
  • Sensitive data exposure
  • Default credentials or pages
  • Detecting vulnerabilities
  • Detecting cross-site scripting
  • Burp Suite Professional
  • OWASP Zed Attack Proxy
  • Conclusion
  • General questions
  • Programming questions
  • Programming challenge
14

Fuzzing with Python

  • Introduction
  • Importance of fuzzing in security testing
  • Fundamentals of Python in fuzzing
  • Types of fuzzing techniques
  • Designing a basic fuzzer in Python
  • Advanced fuzzing concepts with Python
  • Fuzzing network protocols with Python
  • Creating fuzzers for executables
  • Famous tools used in fuzzing executables
  • Fuzzing Windows executables
  • Fuzzing Linux executables
  • Creating fuzzers for web applications
  • Challenges and limitations of fuzzing with Python
  • Conclusion
15

ChatGPT with Python

  • Introduction
  • Generating and completing code
  • Enhancing code quality and efficiency
  • Leveraging ChatGPT in Machine Learning projects
  • Integrating ChatGPT with Python libraries and frameworks
  • Challenges and best practices in ChatGPT-Python integration
  • Conclusion
  • General questions
  • Programming challenge

Related Courses

All Course
scroll to top