Beginning Ethical Hacking with Python (2017)

Overview

Below is an outline of the eBook "Beginning Ethical Hacking with Python (2017)". If you’re a member, then you can log into the Library and view it in your browser using the email address you signed up with. PS. Only members can successfully log in.

  • Click HERE to log into the library (Members only).
  • Folder: Books and Guides > Security - Penetration Testing

If you are having issues logging in, please check the following help guide, HERE.

 

Outline

1. Legal Side of Hacking
2. Hacking Environment
2.1.1. Ethical Hacking and Networking
2.1.2. What Does Network Mean?
2.1.3. Summary
3. Installing Virtual Box
4. Installing Kali Linux and Other Operating Systems on VB
5. Linux Terminal, Basic Commands
5.1.1. Summary

6. Python 3 and Ethical Hacking
7. Python Environment
8. General Syntaxes
8.1.1. Create the main( ) function
8.1.2. Indentation and White Space
8.1.3. Commenting
8.1.4. Assigning Values
9. Variables, Objects and Values
9.1.1. Using Numbers
9.1.2. String
9.1.3. What is Type and ID
9.1.4. Logical Values
9.1.5. Tuples And Lists.
9.1.6. Dictionary
9.1.7. Object
10. Conditionals
11. Loops
11.1.1. While Loops
11.1.2. For Loops
12. Regular Expressions
12.1.1. Using "re" Module
12.1.2. Reusing With Regular Expressions
12.1.3. Searching with Regular Expressions
13. Exceptions, Catching Errors
14. Functions
14.1.1. Return Values
14.1.2. Generate Functions
14.1.3. Lists of Arguments
14.1.4. Named Arguments
15. Classes
15.1.1. Object-Oriented Methodology
15.1.2. The Foundation of Object Orientation
15.1.3. Understanding Classes and Objects
15.1.4. Write Your Own Game, "Good Vs Bad"
15.1.5. Primary Class and Object
15.1.6. Accessing Object Data
15.1.7. Polymorphism
15.1.8. Using Generators
15.1.9. Inheritance
15.1.10. Decorator
16. String Methods
17. File Input And Output
18. Containers
18.1.1. Operating on Tuple and List Object
18.1.2. Operating on Dictionary Object
19. Database
19.1.1. Let us start with SQLite3
19.1.2. MySQL for Big Project
20. Module
21. Debugging, Unittest Module
22. Socket and Networking
23. Importing Nmap Module
24. Building an Nmap Network Scanner
25. Protect Anonymity on the Internet
26. Dark Web and Tor
26.1.1. Hidden Wikipedia
27. Proxy Chains
28. Virtual Private Network or VPN
29. MAC Address
30. Epilogue - What Next
31. Index

 

-----

Next steps:

This article was contributed by Jason Jacobs from Guyana. Jason is a member of the Caribbean CSPA. 

Was this article helpful?
0 out of 0 found this helpful

Comments

0 comments

Article is closed for comments.