Beginning Ethical Hacking with Python

Beginning Ethical Hacking with PythonReviews
Author: Sanjib Sinha
Pub Date: 2017
ISBN: 978-1-4842-2540-0
Pages: 201
Language: English
Format: PDF
Size: 10 Mb


Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set you up with a foundation that will help you understand the advanced concepts of hacking in the future. Learn Ethical Hacking with Python 3 touches the core issues of cyber security: in the modern world of interconnected computers and the Internet, security is increasingly becoming one of the most important features of programming.
Ethical hacking is closely related to Python. For this reason this book is organized in three parts. The first part deals with the basics of ethical hacking; the second part deals with Python 3; and the third part deals with more advanced features of ethical hacking.
What You Will Learn

  • Discover the legal constraints of ethical hacking
  • Work with virtual machines and virtualization
  • Develop skills in Python 3
  • See the importance of networking in ethical hacking
  • Gain knowledge of the dark web, hidden Wikipedia, proxy chains, virtual private networks, MAC addresses, and more

Who This Book Is For
Beginners wanting to learn ethical hacking alongside a modular object oriented programming language.


Table of Contents

Part I
1: Legal Side of Hacking
2: Hacking Environment
3: Installing Virtual Box
4: Installing Kali Linux and Other Operating Systems on VB
5: Linux Terminal, Basic Commands
Part II
6: Python 3 and Ethical Hacking
7: Python Environment
8: General Syntaxes
9: Variables, Objects and Values
10: Conditionals
11: Loops
12: Regular Expressions
13: Exceptions, Catching Errors
14: Functions
15: Classes
16: String Methods
17: File Input And Output
18: Containers
19: Database
20: Module
21: Debugging, Unittest Module
22: Socket and Networking
23: Importing Nmap Module
24: Building an Nmap Network Scanner
Part III
25: Protect Anonymity on the Internet
26: Dark Web and Tor
27: Proxy Chains
28: Virtual Private Network or VPN
29: MAC Address
Epilogue—What Next