Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Python Penetration Testing Essentials
  • Toc
  • feedback
Python Penetration Testing Essentials

Python Penetration Testing Essentials

By : Mohit Raj
3.2 (10)
close
Python Penetration Testing Essentials

Python Penetration Testing Essentials

3.2 (10)
By: Mohit Raj

Overview of this book

This book gives you the skills you need to use Python for penetration testing (pentesting), with the help of detailed code examples. We start by exploring the basics of networking with Python and then proceed to network hacking. Then, you will delve into exploring Python libraries to perform various types of pentesting and ethical hacking techniques. Next, we delve into hacking the application layer, where we start by gathering information from a website. We then move on to concepts related to website hacking—such as parameter tampering, DDoS, XSS, and SQL injection. By reading this book, you will learn different techniques and methodologies that will familiarize you with Python pentesting techniques, how to protect yourself, and how to create automated programs to find the admin console, SQL injection, and XSS attacks.
Table of Contents (11 chapters)
close

Fake ARP reply

In this section, we will learn how to send a fake ARP reply. The fake ARP reply program is made for the fake ping reply because when the attacker sends the ping request to a particular IP, the attacker machine first sends an ARP request for the MAC address.

When an attacker is on the subnet of the honeypot or outside the subnet, a fake reply will be sent by the honeypot. Let's see the topology diagram:

I have used three machines: Debian running honeypot codes, RHEL, as a gateway, and Kali Linux, as the attacker machine.

Let's see the fake reply code. The code name is arp_reply.py:

  • The following modules will be used in the code:
      import socket
import struct
import binascii
import Queue
import threading
import sys
  • In the following code, two sockets have been created. One for the receiver and one for sending the reply...

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech
bookmark search playlist font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete