Attack and Defense with Python
E-Book, Englisch, 187 Seiten, eBook
ISBN: 978-3-662-44437-5
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
Bastian Ballmann is a professional programmer, system engineer and member of the Chaos Computer Club since 2002. He holds lectures on network hijacking attacks as well as Bluetooth hacking and is the author of various security related tools like P.A.T.H., Blue diving and Chaosmap. In his free time he also writes the German Datenterrorist Blog and produced the podcasts Freibyte and Gesprächssituation about computer and security related stuff.
Zielgruppe
Professional/practitioner
Autoren/Hrsg.
Weitere Infos & Material
1;Preface;8
2;Contents;10
3;Introduction;14
3.1;Who Should Read This Book?;14
3.2;The Structure of the Book;14
3.3;The Most Important Security Principles;15
4;Chapter1 Installation;16
4.1;1.1 The Right Operating System;16
4.2;1.2 The Right Python Version;16
4.3;1.3 Development Environment;17
4.4;1.4 Python Modules;18
5;Chapter2 Network 4 Newbies;19
5.1;2.1 Components;19
5.2;2.2 Topologies;19
5.3;2.3 ISO/OSI Layer Model;21
5.4;2.4 Ethernet;22
5.5;2.5 VLAN;23
5.6;2.6 ARP;24
5.7;2.7 IP;24
5.8;2.8 ICMP;26
5.9;2.9 TCP;26
5.10;2.10 UDP;30
5.11;2.11 An Example Network;30
5.12;2.12 Architecture;31
5.13;2.13 Gateway;32
5.14;2.14 Router;32
5.15;2.15 Bridge;33
5.16;2.16 Proxies;33
5.17;2.17 Virtual Private Networks;33
5.18;2.18 Firewalls;34
5.19;2.19 Man-in-the-Middle-Attacks;35
6;Chapter3 Python Basics;36
6.1;3.1 Every Start Is Simple;36
6.2;3.2 The Python Philosophy;37
6.3;3.3 Data Types;38
6.4;3.4 Data Structures;39
6.5;3.5 Functions;40
6.6;3.6 Control Structures;41
6.7;3.7 Modules;43
6.8;3.8 Exceptions;44
6.9;3.9 Regular Expressions;44
6.10;3.10 Sockets;46
7;Chapter4 Layer 2 Attacks;48
7.1;4.1 Required Modules;48
7.2;4.2 ARP-Cache-Poisoning;48
7.3;4.3 ARP-Watcher;52
7.4;4.4 MAC-Flooder;54
7.5;4.5 VLAN Hopping;55
7.6;4.6 Let's Play Switch;55
7.7;4.7 ARP Spoofing Over VLAN Hopping;56
7.8;4.8 DTP Abusing;57
7.9;4.9 Tools;58
7.9.1;4.9.1 NetCommander;58
7.9.2;4.9.2 Hacker's Hideaway ARP Attack Tool;58
7.9.3;4.9.3 Loki;58
8;Chapter5 TCP/IP Tricks;59
8.1;5.1 Required Modules;59
8.2;5.2 A Simple Sniffer;59
8.3;5.3 Reading and Writing PCAP Dump Files;61
8.4;5.4 Password Sniffer;63
8.5;5.5 Sniffer Detection;65
8.6;5.6 IP-Spoofing;66
8.7;5.7 SYN-Flooder;67
8.8;5.8 Port-Scanning;68
8.9;5.9 Port-Scan Detection;71
8.10;5.10 ICMP-Redirection;73
8.11;5.11 RST Daemon;75
8.12;5.12 Automatic Hijack Daemon;77
8.13;5.13 Tools;80
8.13.1;5.13.1 Scapy;80
9;Chapter6 WHOIS DNS?;84
9.1;6.1 Protocol Overview;84
9.2;6.2 Required Modules;85
9.3;6.3 Questions About Questions;85
9.4;6.4 WHOIS;86
9.5;6.5 DNS Dictionary Mapper;87
9.6;6.6 Reverse DNS Scanner;88
9.7;6.7 DNS-Spoofing;91
9.8;6.8 Tools;94
9.8.1;6.8.1 Chaosmap;94
10;Chapter7 HTTP Hacks;95
10.1;7.1 Protocol Overview;95
10.2;7.2 Web Services;98
10.3;7.3 Required Modules;98
10.4;7.4 HTTP Header Dumper;99
10.5;7.5 Referer Spoofing;99
10.6;7.6 The Manipulation of Cookies;100
10.7;7.7 HTTP-Auth Sniffing;101
10.8;7.8 Webserver Scanning;102
10.9;7.9 SQL Injection;105
10.10;7.10 Command Injection;111
10.11;7.11 Cross-Site-Scripting;112
10.12;7.12 SSL Sniffing;113
10.13;7.13 Proxy Scanner;117
10.14;7.14 Proxy Port Scanner;119
10.15;7.15 Tools;121
10.15.1;7.15.1 SSL Strip;121
10.15.2;7.15.2 Cookie Monster;121
10.15.3;7.15.3 Sqlmap;122
10.15.4;7.15.4 W3AF;122
11;Chapter8 Wifi Fun;123
11.1;8.1 Protocol Overview;123
11.2;8.2 Required Modules;125
11.3;8.3 Wifi Scanner;126
11.4;8.4 Wifi Sniffer;127
11.5;8.5 Probe-Request Sniffer;128
11.6;8.6 Hidden SSID;129
11.7;8.7 MAC-Address-Filter;130
11.8;8.8 WEP;130
11.9;8.9 WPA;132
11.10;8.10 WPA2;134
11.11;8.11 Wifi-Packet-Injection;134
11.12;8.12 Playing Wifi Client;135
11.13;8.13 Deauth;137
11.14;8.14 Wifi Man-in-the-Middle;138
11.15;8.15 Wireless Intrusion Detection;143
11.16;8.16 Tools;144
11.16.1;8.16.1 WiFuzz;144
11.16.2;8.16.2 Pyrit;145
11.16.3;8.16.3 AirXploit;145
12;Chapter9 Feeling Bluetooth on the Tooth;146
12.1;9.1 Protocol Overview;146
12.2;9.2 Required Modules;147
12.3;9.3 Bluetooth-Scanner;148
12.4;9.4 SDP-Browser;149
12.5;9.5 RFCOMM-Channel-Scanner;149
12.6;9.6 OBEX;151
12.7;9.7 Blue Snarf Exploit;152
12.8;9.8 Blue Bug Exploit;153
12.9;9.9 Bluetooth-Spoofing;154
12.10;9.10 Sniffing;155
12.11;9.11 Tools;157
12.11.1;9.11.1 BlueMaho;157
13;Chapter10 Bargain Box Kung Fu;158
13.1;10.1 Required Modules;158
13.2;10.2 Spoofing E-mail Sender;158
13.3;10.3 DHCP Hijack;159
13.4;10.4 IP Brute Forcer;163
13.5;10.5 Google-Hacks-Scanner;164
13.6;10.6 SMB-Share-Scanner;165
13.7;10.7 Login Watcher;166
14;AppendixA Scapy Reference;170
14.1;A.1 Protocols;170
14.2;A.2 Functions;171
15;AppendixB Secondary Links;182
16;Index;184
Installation.- Networks 4 newbies.- Python Basics.- Layer 2 attacks.- TCP / IP Tricks.- WHO IS DNS?.- HTTP Hacks.- Wifi fun.- Feeling Bluetooth on the Tooth.- Bargain Box Kung Fu.- Scapy Reference.- Secondary Links.- Index.