bridging FTP and web,
56
–
66
N
National Oceanic and Atmospheric Administration (NOAA),
214
Network-based intrusion detection system (NIDS),
162
NIDS.
See
Network-based intrusion detection system
NOAA.
See
National Oceanic and Atmospheric Administration
O
Organizational unique identifier (OUI),
203
P
Password authentication,
50
–
52
PDF file.
See
Portable document format file
PDF metadata parsing using PyPDF,
93
–
95
pentest engagement document,
2
UNIX password cracker,
21
–
24
zip-file password cracker,
24
–
29
setting up development environment
interpreted vs. interactive Python,
5
–
6
Python standard library,
2
third party libraries installations,
3
–
5
Pentagon’s computer network,
143
decoy Nmap scan identification,
149
Phishing with Smtplib,
239
Portable document format file (PDF file),
93
Public-key cryptograph,
50
cyber fast track program,
24
UNIX password cracker,
21
–
24
zip-file password cracker,
24
–
29
using findCreditCard() function,
176
credit card information,
175
using findCreditCard() function,
176
unencrypted wireless network,
177
–
178
Python interaction with Metasploit
using Nmap-Python module,
69
Python ObexFTP, printer with,
207
–
208
Python programming language,
6
–
7
,
32
built-in sys module,
17
–
18
iteration
testing IP addresses,
15
–
16
vulnerabilities checking,
14
–
15
Python-Nmap integration,
39
locating and identifying targets,
40
–
41
R
Recycle bin, deleted item recover in,
89
SID correlation to user,
90
–
93
RFCOMM channel scanning
Bluetooth service discovery profile,
206
unauthenticated channels,
205
–
206
Rich Text Format (RTF),
81
–
82
RSH.
See
Remote shell
S
Scraping web pages with anonbrowser,
219
interaction with Google,
223
–
224
parsing tweets
SDP.
See
Service discovery protocol
botnetCommand() function,
53
–
55
wrapping botnet script,
55
exploitation through weak private keys,
48
–
49
password authentication,
50
–
52
public-key cryptograph,
50
testing against target,
52
interaction through Pexpect,
42
connecting with script,
45
session.expect() method,
43
passwords with Pxssh,
45
–
46
Service discovery protocol (SDP),
206
–
207
Service Message Block protocol (SMB protocol),
150
session.expect
() method,
43
Skype database queries,
108
using Python and sqlite3,
102
–
108
Skype sqlite3 database,
100
–
102
SMB protocol.
See
Service Message Block protocol
Sniffing hotel guests
plaintext transmission,
178
–
179
public wireless networks,
178
SNORT
exploit.rules signature file for,
164
SSH.
See
Secure Shell
Stack-based buffer
overflows
,
74
–
75
Stalking with Bluetooth and Python,
201
Bluetooth RFCOMM channel scanning
Bluetooth service discovery profile,
206
unauthenticated channels,
205
–
206
discover_devices()
function,
201
intercepting wireless traffic,
203
–
205
Python ObexFTP, printer with,
207
–
208
T
TCP
TCP port scanner
application banner grabbing,
35
–
36
Python-Nmap integration,
39
locating and identifying targets,
40
–
41
parsing target hostname,
33
–
34
Third party libraries installations
easy_install python-nmap,
4
Using
python setup.py install
3
–
4
Python Windows Installer,
5
Time-to-live field (TTL field),
143
–
144
U
UAVs, intercepting and spying on,
189
crafting 802.11 frames
emergency-land command,
194
–
195
Uniform resource identifier (URI),
136
UNIX password cracker,
21
–
24
Unmanned aerial vehicles (UAVs),
188
–
189
emergency-land command,
194
–
195
URI.
See
Uniform resource identifier
V
Virtual private network (VPN),
214
VPN.
See
Virtual private network
W
W32DownandUp Worm.
See
Conficker