Index
Note
: Page numbers followed by “f” and “t” indicate figures and tables respectively
A
Administrative network share (ADMINS),
67
ADMINS.
See
Administrative network share
airmon-ng start wlan
0 command,
172
malicious spam email sending,
241
–
242
phishing with Smtplib,
239
Application artifact investigation,
100
See also
Python
Firefox sqlite3 databases,
108
–
116
Skype database queries,
108
Skype sqlite3 database,
100
–
102
B
BeautifulSoup, image downloading with,
96
–
97
Bluetooth
installing Python Bluetooth packages,
173
–
174
Paris Hilton not hacked by,
208
Bluetooth RFCOMM channel scanning
Bluetooth service discovery profile,
206
unauthenticated channels,
205
–
206
Bridging FTP and web
anonymous FTP server with Python,
57
user credentials
finding account with password guest,
59
web page malicious injection,
60
index.html page downloading,
62
wrapping entire attack
fake Antivirus propagation,
66
script against vulnerable FTP,
65
Brute force
remote process execution,
71
Built-in sys module,
17
–
18
C
Cambridge Silicon Radio (CSR),
174
Catching Wordpress cookie reuse,
199
–
201
See also
Morris worm
Python interaction with Metasploit
using Nmap-Python module,
69
remote process execution brute force,
71
Windows SMB service attacking
system exploitation,
68
–
69
wrapping entire script,
71
–
74
Conficker’s domain flux,
150
Crafting 802.11 frames
emergency-land command,
194
–
195
CSR.
See
Cambridge Silicon Radio
Cyber Fast Track program,
24
Cyber-attack
evading antivirus programs
evasion verification
using default Metasploit encoder,
254
–
255
printing detection rate string,
252
–
254
uploaded file analysis,
250
–
251
D
DDoS.
See
Distributed denial of service
De-cloaking hidden 802.11 networks,
188
–
189
discover_devices()
function,
201
Distributed denial of service (DDoS),
93
DNS.
See
Domain name service
DNS Question Record (DNSQR),
150
–
151
DNS Resource Record (DNSRR),
150
–
151
Domain name service (DNS),
149
E
Exchange image file format (Exif),
95
–
96
Exif.
See
Exchange image file format
F
File Transfer Protocol (FTP),
56
,
184
searching web pages on,
59
–
60
Firefox sqlite3 databases,
108
–
116
catching Wordpress cookie reuse,
199
–
201
Wordpress session cookies,
198
–
199
Foiling IDS, with scapy,
162
–
168
Forensic investigations,
81
–
82
application artifacts investigation,
100
automate Skype database queries,
102
–
108
parsing Firefox sqlite3 databases,
108
–
116
Skype sqlite3 database,
100
–
102
deleted item recovery using Python in,
89
SID correlation to user,
90
–
93
iTunes mobile backups investigation,
116
–
122
using PyPDF to parse PDF metadata,
93
–
95
reading Exif metadata from,
97
–
100
solving BTK murders,
81
–
82
wireless access points analysis,
82
–
83
MAC address submitting to Wigle,
85
–
89
Windows Registry reading using WinReg,
83
–
85
FTP.
See
File Transfer Protocol
FTP credential sniffer,
186
intercepted user credentials,
184
G
Geo-location
H
hciconfig
config command,
174
Hidden network 802.11 beacon detection,
187
–
188
Half-open scan.
See
TCP Syn scan
I
Iceman.
See
Butler, Max Ray
IDS.
See
Intrusion detection system
Mechanize’s primary class,
212
–
213
Internet Protocol address (IP address),
126
–
127
Internet Protocol traffic (IP traffic),
126
–
127
Scapy packet manipulation,
128
Internet Relay Chat (IRC),
137
Interpreted and interactive Python relationship
See also
Python
statement execution process,
6
Intrusion detection system (IDS),
41
–
42
,
162
IP address.
See
Internet Protocol address
IP traffic.
See
Internet Protocol traffic
IRC.
See
Internet Relay Chat
iTunes mobile backups investigation
using
isMessageTable()
function,
119
mobile backup directory,
118
–
119
mobile directory backup,
117
printMessage()
function,
120
–
122
K
Kevin Mitnick
and sequence prediction,
154
–
162
L
List data structure in Python,
8
–
9
Listening for 802.11 probe requests,
186
–
187
Low Orbit Ion Cannon (LOIC),
54
,
135
DDoS attack
M
Mechanize’s primary class,
212
–
213
anonymous’ metadata fail,
93
BeautifulSoup, image downloading with,
96
–
97
PDF metadata parsing using PyPDF,
93
–
95
Metasploit, Windows SMB service attacking,
67
–
68
Metasploit, Python interaction with
using Nmap-Python module,
69
Metasploit encoder, in cyber-attack,
254
–
255
Meterpreter process,
69
–
70