About the Author |
|
xi | |
About the Technical Reviewer |
|
xiii | |
Acknowledgments |
|
xv | |
Prologue -- Hacker's Goal |
|
xvii | |
|
|
1 | (34) |
|
Chapter 1 Legal Side of Hacking |
|
|
3 | (2) |
|
Chapter 2 Hacking Environment |
|
|
5 | (4) |
|
Ethical Hacking and Networking |
|
|
6 | (1) |
|
|
6 | (2) |
|
|
8 | (1) |
|
Chapter 3 Installing Virtual Box |
|
|
9 | (4) |
|
Chapter 4 Installing Kali Linux and Other Operating Systems on VB |
|
|
13 | (8) |
|
Chapter 5 Linux Terminal, Basic Commands |
|
|
21 | (14) |
|
|
33 | (2) |
|
|
35 | (134) |
|
Chapter 6 Python 3 and Ethical Hacking |
|
|
37 | (2) |
|
Chapter 7 Python Environment |
|
|
39 | (4) |
|
Chapter 8 General Syntaxes |
|
|
43 | (6) |
|
Create the main() function |
|
|
43 | (1) |
|
Indentation and White Space |
|
|
44 | (2) |
|
|
46 | (1) |
|
|
47 | (2) |
|
Chapter 9 Variables, Objects and Values |
|
|
49 | (18) |
|
|
52 | (2) |
|
|
54 | (2) |
|
|
56 | (3) |
|
|
59 | (1) |
|
|
60 | (3) |
|
|
63 | (1) |
|
|
64 | (3) |
|
|
67 | (2) |
|
|
69 | (6) |
|
|
69 | (2) |
|
|
71 | (4) |
|
Chapter 12 Regular Expressions |
|
|
75 | (6) |
|
|
75 | (2) |
|
Reusing With Regular Expressions |
|
|
77 | (1) |
|
Searching with Regular Expressions |
|
|
78 | (3) |
|
Chapter 13 Exceptions, Catching Errors |
|
|
81 | (4) |
|
|
85 | (12) |
|
|
90 | (1) |
|
|
90 | (3) |
|
|
93 | (1) |
|
|
94 | (3) |
|
|
97 | (24) |
|
Object-Oriented Methodology |
|
|
97 | (1) |
|
The Foundation of Object Orientation |
|
|
97 | (1) |
|
Understanding Classes and Objects |
|
|
98 | (4) |
|
Write Your Own Game, "Good Vs Bad" |
|
|
102 | (4) |
|
|
106 | (5) |
|
|
111 | (3) |
|
|
114 | (2) |
|
|
116 | (1) |
|
|
117 | (2) |
|
|
119 | (2) |
|
Chapter 16 String Methods |
|
|
121 | (6) |
|
Chapter 17 File Input And Output |
|
|
127 | (2) |
|
|
129 | (8) |
|
Operating on Tuple and List Object |
|
|
130 | (5) |
|
Operating on Dictionary Object |
|
|
135 | (2) |
|
|
137 | (12) |
|
Let us start with SQLite3 |
|
|
137 | (1) |
|
|
138 | (11) |
|
|
149 | (4) |
|
Chapter 21 Debugging, Unittest Module |
|
|
153 | (4) |
|
Chapter 22 Socket and Networking |
|
|
157 | (2) |
|
Chapter 23 Importing Nmap Module |
|
|
159 | (6) |
|
Chapter 24 Building an Nmap Network Scanner |
|
|
165 | (4) |
|
|
169 | (26) |
|
Chapter 25 Protect Anonymity on the Internet |
|
|
171 | (2) |
|
Chapter 26 Dark Web and Tor |
|
|
173 | (6) |
|
|
174 | (5) |
|
|
179 | (6) |
|
Chapter 28 Virtual Private Network or VPN |
|
|
185 | (6) |
|
|
191 | (4) |
Epilogue---What Next |
|
195 | (2) |
Index |
|
197 | |