Professional Documents
Culture Documents
45150
45150
https://ebookmass.com/product/python-programming-and-
sql-10-books-in-1-supercharge-your-career-with-python-
programming-and-sql-andrew-reed/
https://ebookmass.com/product/c-and-python-applications-
embedding-python-code-in-c-programs-sql-methods-and-python-
sockets-philip-joyce/
https://ebookmass.com/product/beginning-c23-7th-edition-ivor-
horton-2/
https://ebookmass.com/product/beginning-c23-7th-edition-ivor-
horton/
Coding for Kids 5 Books in 1: Javascript, Python and
C++ Guide for Kids and Beginners Bob Mather
https://ebookmass.com/product/coding-for-kids-5-books-
in-1-javascript-python-and-c-guide-for-kids-and-beginners-bob-
mather/
https://ebookmass.com/product/modern-c-for-absolute-beginners-a-
friendly-introduction-to-the-c-programming-language-
and-c11-to-c23-standards-2nd-edition-slobodan-dmitrovic/
https://ebookmass.com/product/see-yourself-in-cyber-security-
careers-beyond-hacking-1st-edition-anonymous/
https://ebookmass.com/product/coding-for-kids-5-books-
in-1-javascript-python-and-c-guide-for-kids-and-beginners-coding-
for-absolute-beginners-mather/
https://ebookmass.com/product/python-programming-3-books-
in-1-ultimate-beginners-intermediate-advanced-guide-to-learn-
python-step-by-step/
Devwebtuts Publishing
First edition
Contents
Preface
Introduction
Python Basics for Hacking
Script 1 - Port Scanner
Script 2 - FTP Password Cracker
Script 3 - Packet Sniffer
Script 4 - Email Scraper
Script 5 - KeyLogger
Script 6 - Web Scraper
Script 7 - WiFi SSID Sniffer
Script 8 - Phishing Page Creator
Script 9 - Brute Force Password Cracker
Script 10 - Network Vulnerability Scanner
Project: A Penetration Testing Tool
Conclusion
Python Cheat Sheet
Download the Code Examples
As you set off on this ethical hacking adventure, let this book
serve as your compass, leading you toward your goals. Armed
with the necessary tools and the right mindset, you’re all set
to delve into the intriguing world of cybersecurity.”
I
Book 1: Python Hacking
W
elcome aboard the intriguing and pragmatic
educational adventure. Regardless of one’s past
experience or knowledge base, this course serves as a
portal into the captivating universe of ethical hacking viewed
through the Python programming lens.
Overview
Embarking on this course, you set sail on an exploratory
voyage into the sphere of ethical hacking, utilizing Python.
The curriculum has been meticulously devised to offer an
immersive, comprehensive, and crystal-clear learning
experience to pupils at all stages.
But it’s not just about breaking into systems. Ethical hackers
also test how well a system can keep running if it’s under
attack. This is like pushing how well a ship can stay afloat in a
storm. After all, it’s not very helpful to have a ship that sinks
at the first sign of bad weather!
Syntax
P
ython syntax is the set of rules that dictate how Python
programs are written. It’s like the grammar of the
language. Thankfully, Python syntax is clean and
straightforward. Let’s write a simple Python program.
1. Open Visual Studio Code.
2. Create a new file and save it as hello_world.py.
3. Type the following into the file:
print("Hello, World!")
Variables
Variables are like containers for storing data. They can hold
different types of data, such as numbers, strings, lists, etc.
Here’s how you create a variable in Python:
Create a new file in Visual Studio Code and name it
variables.py.
Type the following into the file:
Another random document with
no related content on Scribd:
mächtigem grauen Schlapphut. Sie erzählten mir allerlei
Neuigkeiten, darunter auch die von meinem eigenen Tode. Der
Europäer, meinten sie nämlich, der früher in Katoto sass, sei von
den Wagaya todtgeschlagen worden. Andere behaupteten, er wäre
vielleicht doch nicht ganz todt, habe jedoch eine Speerwunde
erhalten. Ich lachte damals über dieses Negergeschwätz, konnte ich
doch nicht ahnen, dass sich ein schlauer Europäer (der
Stationsvorsteher von Mwansa) finden würde, der nichts eiligeres zu
thun hatte, als diesen Unsinn nach der Küste zu melden, von wo er
nach Europa gelangte und dort unnütze Besorgnisse hervorrief.
Am 19. Juli hatten wir Usmau hinter uns und betraten Usukuma
im engeren Sinne, wie die Landschaften am Nyansa genannt
werden. Am nächsten Tage stiegen wir den steilen Abfall zum See
ab und erreichten gegen Mittag die Station Mwa n sa. Wieder
breitete sich der herrliche See vor uns aus und drüben, jenseits der
Bai, tauchten die grünen Ufer Usinja's verheissungsvoll aus der
tiefblauen Fluth.