Basic and Low-level Python Network Attacks [Video]

Basic and Low-level Python Network Attacks [Video]

Sam Bowne

Explore the world of Basic and Low-Level Network Attacks with Python
Video
$10.00
RRP $124.99
Save 91%
What do I get with a Mapt Pro subscription?
  • Unlimited access to all Packt’s 5,000+ eBooks and Videos
  • Early Access content, Progress Tracking, and Assessments
  • 1 Free eBook or Video to download and keep every month after trial
What do I get with an eBook?
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with Print & eBook?
  • Get a paperback copy of the book delivered to you
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with a Video?
  • Download this Video course in MP4 format
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
$10.00
RRP $124.99

Frequently bought together


Basic and Low-level Python Network Attacks [Video] Book Cover
Basic and Low-level Python Network Attacks [Video]
$ 124.99
$ 10.00
ARP Spoofing and Man In The Middle Attacks: Execution and Detection [Video] Book Cover
ARP Spoofing and Man In The Middle Attacks: Execution and Detection [Video]
$ 49.99
$ 10.00
Buy 2 for $20.00
Save $154.98
Add to Cart

Video Details

ISBN 139781788399432
Course Length2 hours 22 minutes

Video Description

A penetration tester who only knows how to use tools written by others is limited to old techniques. Knowledge of a programming language will make you much more powerful. Python is the favorite choice for penetration testers because it combines simplicity and ease of use with advanced features.This course will commence by showing you how to get the Target and Attacker virtual machines running and properly networked together. You will learn how to connect to a server, and how to automate login requests. This will let you break into services by guessing PINs, and exploit blind vulnerabilities by observing time delays. You will also get your hands dirty and learn how to write custom scanning tools, so that you can send unusual patterns of packets to find and exploit hidden services. Next, you will learn how Web pages are delivered, and how to write your own tools to break into vulnerable websites. Some "blind" services don't return any useful information to guide attackers, but can still be exploited by measuring the time they take to respond. You will also be walked through an in depth understanding of the exact series of network packets required to connect to servers, you can perform many attacks that block traffic or misdirect it through the attacker's system. Using the Scapy library, you can then quickly make network tools, including clients and servers. This is the best way to learn exactly how networking works. Now that you understand normal networking, you can perform attacks that trick networks into sending data to the wrong destination, or refusing service to clients. Towards the end of the course, you will also learn to use these tools to make defenses that distract and confuse attackers, or that detect suspicious network activity.

Style and Approach

The goal of this video course is to show you how you can quickly and easily make simple attack tools with Python, even if you have never programmed before.  

What You Will Learn

  • In this video course you will learn Code network servers and clients and automate repetitive tasks, including brute-force login attacks
  • Break into services by guessing PINs, and exploit blind vulnerabilities by observing time delays
  • Write custom scanning tools, so you can send unusual patterns of packets to find and exploit hidden services
  • Learn how Web pages are delivered, and how to write your own tools to break into vulnerable websites
  • Trick networks into sending data to the wrong destination, or refusing service to clients these tools to make defenses that distract and confuse attackers, or that detect suspicious network activity.

Authors

Video Details

ISBN 139781788399432
Course Length2 hours 22 minutes
Read More

Read More Reviews

These popular $10 titles might interest you

ARP Spoofing and Man In The Middle Attacks: Execution and Detection [Video] Book Cover
ARP Spoofing and Man In The Middle Attacks: Execution and Detection [Video]
$ 49.99
$ 10.00
AWS Networking Solutions [Video] Book Cover
AWS Networking Solutions [Video]
$ 124.99
$ 10.00
Learn Python in 3 Hours [Video] Book Cover
Learn Python in 3 Hours [Video]
$ 124.99
$ 10.00
Creating and Running an Agile Project in JIRA [Video] Book Cover
Creating and Running an Agile Project in JIRA [Video]
$ 124.99
$ 10.00
Selenium WebDriver With Python 3.x - Novice To Ninja [Video] Book Cover
Selenium WebDriver With Python 3.x - Novice To Ninja [Video]
$ 199.99
$ 10.00
Test Driven Development with C# and .NET Core MVC [Video] Book Cover
Test Driven Development with C# and .NET Core MVC [Video]
$ 124.99
$ 10.00