What this book covers
Chapter 1, Python with Penetration Testing and Networking, aims to complete the prerequisites of the following chapters. This chapter also discusses the socket and its methods. The server socket's method defines how to create a simple server.
Chapter 2, Scanning Pentesting, covers how network scanning is done to gather information on a network, host, and the service that are running on the hosts.
Chapter 3, Sniffing and Penetration Testing, teaches how to perform active sniffing, how to create a layer 4 sniffer, and how to perform layer 3 and layer 4 attacks.
Chapter 4, Wireless Pentesting, teaches wireless frames and how to obtain information such as SSID, BSSID, and the channel number from a wireless frame using a Python script. In this type of attack, you will learn how to perform pentesting attacks on the AP.
Chapter 5, Foot Printing of a Web Server and a Web Application, teaches the importance of a web server signature, and why knowing the server signature is the first step in hacking.
Chapter 6, Client-side and DDoS Attacks, teaches client-side validation as well as how to bypass client-side validation. This chapter covers the implantation of four types of DDoS attacks.
Chapter 7, Pentesting of SQLI and XSS, covers two major web attacks, SQL injection and XSS. In SQL injection, you will learn how to find the admin login page using a Python script.