E-Book, Englisch, 197 Seiten
Sinha Beginning Ethical Hacking with Python
1. ed
ISBN: 978-1-4842-2541-7
Verlag: Apress
Format: PDF
Kopierschutz: 1 - PDF Watermark
E-Book, Englisch, 197 Seiten
ISBN: 978-1-4842-2541-7
Verlag: Apress
Format: PDF
Kopierschutz: 1 - PDF Watermark
Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set you up with a foundation that will help you understand the advanced concepts of hacking in the future. Learn Ethical Hacking with Python 3 touches the core issues of cyber security: in the modern world of interconnected computers and the Internet, security is increasingly becoming one of the most important features of programming. Ethical hacking is closely related to Python. For this reason this book is organized in three parts. The first part deals with the basics of ethical hacking; the second part deals with Python 3; and the third part deals with more advanced features of ethical hacking.
What You Will Learn
Discover the legal constraints of ethical hacking Work with virtual machines and virtualization Develop skills in Python 3See the importance of networking in ethical hackingGain knowledge of the dark web, hidden Wikipedia, proxy chains, virtual private networks, MAC addresses, and more
Who This Book Is For
Beginners wanting to learn ethical hacking alongside a modular object oriented programming language.
Sanjib Sinha writes stories and codes - not in the same order always. He started with C# and .NET framework and won the Microsoft Community Contributor Award in 2011. Later the Open Source Software movement attracted him and he became Linux, PHP and Python enthusiast, specializing in and working on White Hat Ethical Hacking.As a beginner he had to struggled a lot to find an easier way to learn coding. No one told him that coding is like writing - imagining a concept and making it a reality with the help of words and symbols. All through his books he has tried to help the beginners from their own perspectives.
Autoren/Hrsg.
Weitere Infos & Material
1;Contents at a Glance;5
2;Contents;7
3;About the Author;11
4;About the Technical Reviewer;12
5;Acknowledgments;13
6;Prologue – Hacker’s Goal;14
7;PartI;17
7.1;Chapter 1: Legal Side of Hacking;18
7.2;Chapter 2: Hacking Environment;19
7.2.1;Ethical Hacking and Networking;20
7.2.2;What Does Network Mean?;20
7.2.3;Summary;22
7.3;Chapter 3: Installing Virtual Box;23
7.4;Chapter 4: Installing Kali Linux and Other Operating Systems on VB;26
7.5;Chapter 5: Linux Terminal, Basic Commands;33
7.5.1;Summary;45
8;PartII;46
8.1;Chapter 6: Python 3 and Ethical Hacking;47
8.2;Chapter 7: Python Environment;49
8.3;Chapter 8: General Syntaxes;52
8.3.1;Create the main( ) function;52
8.3.2;Indentation and White Space;53
8.3.3;Commenting;55
8.3.4;Assigning Values;56
8.4;Chapter 9: Variables, Objects and Values;57
8.4.1;Using Numbers;60
8.4.2;String;62
8.4.3;What is Type and ID;64
8.4.4;Logical Values;67
8.4.5;Tuples And Lists.;68
8.4.6;Dictionary;71
8.4.7;Object;72
8.5;Chapter 10: Conditionals;75
8.6;Chapter 11: Loops;77
8.6.1;While Loops;77
8.6.2;For Loops;79
8.7;Chapter 12: Regular Expressions;82
8.7.1;Using “re” Module;82
8.7.2;Reusing With Regular Expressions;84
8.7.3;Searching with Regular Expressions;85
8.8;Chapter 13: Exceptions, Catching Errors;88
8.9;Chapter 14: Functions;91
8.9.1;Return Values;96
8.9.2;Generate Functions;96
8.9.3;Lists of Arguments;99
8.9.4;Named Arguments;100
8.10;Chapter 15: Classes;102
8.10.1;Object-Oriented Methodology;102
8.10.2;The Foundation of Object Orientation;102
8.10.3;Understanding Classes and Objects;103
8.10.4;Write Your Own Game, “Good Vs Bad”;107
8.10.5;Primary Class and Object;111
8.10.6;Accessing Object Data;116
8.10.7;Polymorphism;119
8.10.8;Using Generators;121
8.10.9;Inheritance;122
8.10.10;Decorator;124
8.11;Chapter 16: String Methods;126
8.12;Chapter 17: File Input And Output;132
8.13;Chapter 18: Containers;134
8.13.1;Operating on Tuple and List Object;135
8.13.2;Operating on Dictionary Object;140
8.14;Chapter 19: Database;142
8.14.1;Let us start with SQLite3.;142
8.14.2;MySQL for Big Project;143
8.15;Chapter 20: Module;153
8.16;Chapter 21: Debugging, Unittest Module;157
8.17;Chapter 22: Socket and Networking;161
8.18;Chapter 23: Importing Nmap Module;162
8.19;Chapter 24: Building an Nmap Network Scanner;167
9;PartIII;171
9.1;Chapter 25: Protect Anonymity on the Internet;172
9.2;Chapter 26: Dark Web and Tor;173
9.2.1;Hidden Wikipedia;174
9.3;Chapter 27: Proxy Chains;178
9.4;Chapter 28: Virtual Private Network or VPN;183
9.5;Chapter 29: MAC Address;188
10;Epilogue—What Next;192
11;Index;193




