What this book covers
Chapter 1, Working with Python Scripting, introduces you to the Python language, object-oriented programming, data structures, exceptions, managing dependencies for developing with Python, and development environments.
Chapter 2, System Programming Packages, teaches you about the main Python modules for system programming, looking at topics including reading and writing files, threads, sockets, multithreading, and concurrency.
Chapter 3, Socket Programming, provides you with some basics of Python networking using the socket
module. This module exposes all of the necessary pieces to quickly write TCP and UDP clients, as well as servers for writing low-level network applications.
Chapter 4, HTTP Programming, covers the HTTP protocol and the main Python modules, such as the urllib
standard library, and the requests
and httpx
modules to retrieve and manipulate web content. We also cover HTTP authentication mechanisms and how we can manage them with the requests
module.
Chapter 5, Connecting to the Tor Network and Discovering Hidden Services, explains how Tor can assist us in the research and development of tools from an anonymity and privacy point of view. In addition, we will review how to extract information from hidden services using Python modules.
Chapter 6, Gathering Information from Servers, explores the modules that allow the extraction of information that servers are exposing publicly, such as Shodan and Binary Edge. We will also look at getting server banners and information on DNS servers and introduce you to fuzzy processing using the pywebfuzz
module.
Chapter 7, Interacting with FTP, SFTP, and SSH Servers, details the Python modules that allow us to interact with FTP, SFTP, and SSH servers, checking the security in SSH servers with the ssh-audit
tool. Also, we will learn how to implement SSH clients and servers with the asyncSSH
and asyncio
modules.
Chapter 8, Working with Nmap Scanner, introduces Nmap as a port scanner and covers how to implement network scanning with Python and Nmap to gather information on a network, a specific host, and the services that are running on that host. Also, we cover how to find possible vulnerabilities in a given network with Nmap scripts.
Chapter 9, Interacting with Vulnerability Scanner, gets into Nessus and OpenVAS as vulnerability scanners and gives you reporting tools for the main vulnerabilities that can be found in servers and web applications with them. Also, we cover how to use them programmatically from Python, with the nessrest
and Python-gmv
modules.
Chapter 10, Identifying Server Vulnerabilities in Web Applications, covers the main vulnerabilities in web applications with OWASP methodology and the tools we can find in the Python ecosystem for vulnerability scanning in CMS and web applications, such as sqlmap
. We will also cover testing openSSL/TLS vulnerabilities in servers with the sslyze
module.
Chapter 11, Security and Vulnerabilities in Python Modules, covers security and vulnerabilities in Python modules. Also, we cover the review of Python tools such as Bandit as a static code analyzer for detecting vulnerabilities and Python best practices from a security perspective.
Chapter 12, Python Tools for Forensics Analysis, covers the main tools we have in Python for extracting information from memory, sqlite
databases, research about network forensics with PcapXray, getting information from the Windows registry, and using the logging
module to register errors and debug Python scripts.
Chapter 13, Extracting Geolocation and Metadata from Documents, Images, and Browsers, explores the main modules we have in Python for extracting information about geolocation and metadata from images and documents, identifying web technologies, and extracting metadata from Chrome and Firefox browsers.
Chapter 14, Cryptography and Steganography, covers the main modules we have in Python for encrypting and decrypting information, such as pycryptodome
and cryptography
. Also, we cover steganography techniques and how to hide information in images with stepic
modules. Finally, we will cover Python modules for generating keys securely with the secrets
and hashlib
modules.