Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers (34 page)

BOOK: Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
5.25Mb size Format: txt, pdf, ePub
Windows Registry Reading,
82

83
using WinReg,
83

85
Windows SMB service attacking
using Metasploit,
67

68
system exploitation,
68

69
Wireless access point analysis
MAC address using mechanize library,
85

89
SkyHook database,
85
Windows command prompt,
82

83
Windows Registry Reading,
82

83
using WinReg,
83

85
Wireless attack environment setting
HAWNU1,
172
monitor mode,
172
Python Bluetooth package installation,
173

174
wireless capture testing
802.11 Beacon frames,
173
using
airmon-ng start wlan
0 command,
172
pktPrint() procedure,
172

173
Wireless Google key logger,
181
findGoogle()
function,
181

182
Google street view epic fail,
184
Google URL search parameters,
181
HTTP GET request,
181
using sniff() function,
182

183
unencrypted wireless connection,
183
Wireless mayhem with Python,
188

189
de-cloaking hidden 802.11 networks
finding hidden network 802.11 beacons,
187

188
FireSheep detection,
196

197
catching Wordpress cookie reuse,
199

201
wordpress session cookies,
198

199
intercepting on UAVs,
189
crafting 802.11 frames,
192

195
finalizing attack, emergency landing UAV,
195

196
intercepting traffic, dissecting protocol,
189

192
listening for 802.11 probe requests,
186

187
stalking with Bluetooth,
201
BlueBugging phone,
208

209
Bluetooth RFCOMM channel scanning,
205

206
using Bluetooth service discovery protocol,
206

207
intercepting wireless traffic,
203

205
taking over printer with Python ObexFTP,
207

208
wireless attack environment setting,
172
Python Bluetooth package installation,
173

174
wireless capture testing,
172

173
wireless secrets, passively listening to,
174

175
building wireless Google key logger,
181

184
using Python regular expressions,
175

178
sniffing FTPc credentials,
184

186
sniffing hotel guests,
178

181
wireless security,
171

172
Wireless secrets, passively listening to,
174

175
FTPc credentials,
184
FTP credential sniffer,
186
intercept FTP logons,
185

186
intercepted user credentials,
184
Python regular expressions,
175

176
credit card information,
175
using Scapy library,
176

177
test case program,
176
unencrypted wireless network,
177

178
shadow crew,
178
sniffing hotel guests
findGuest()
procedure,
179

180
hotel sniffer program,
180

181
HTTP,
178
plaintext transmission,
178

179
public wireless networks,
178
using scapy library,
180
wireless Google key logger,
181
findGoogle()
function,
181
,
182
Google street view epic fail,
184
Google URL search parameters,
181
HTTP GET request,
181
using sniff() function,
182

183
unencrypted wireless connection,
183
Wordpress session cookies,
198

199

Z

Zero-day proof, concept code of,
74

79
Zip-file password cracker,
24

29

Other books

Allergic To Time by Crystal Gables
Hell on Heels Christmas by Jensen, A.P.
A Husband in Time by Maggie Shayne
Words in the Dust by Trent Reedy
The Art of Deception: Controlling the Human Element of Security by Kevin D. Mitnick, William L. Simon, Steve Wozniak
A Somers Dream by Isabel, Patricia
The Black Echo by Michael Connelly
The Unfinished Clue by Georgette Heyer