Beginning Ethical Hacking with Python, 1st ed.

Language: English

36.91 €

In Print (Delivery period: 15 days).

Add to cartAdd to cart
Publication date:
Support: Print on demand

Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set you up with a foundation that will help you understand the advanced concepts of hacking in the future. Learn Ethical Hacking with Python 3 touches the core issues of cyber security: in the modern world of interconnected computers and the Internet, security is increasingly becoming one of the most important features of programming.

Ethical hacking is closely related to Python. For this reason this book is organized in three parts. The first part deals with the basics of ethical hacking; the second part deals with Python 3; and the third part deals with more advanced features of ethical hacking.


What You Will Learn

  • Discover the legal constraints of ethical hacking
  • Work with virtual machines and virtualization
  • Develop skills in Python 3
  • See the importance of networking in ethical hacking
  • Gain knowledge of the dark web, hidden Wikipedia, proxy chains, virtual private networks, MAC addresses, and more

Who This Book Is For

Beginners wanting to learn ethical hacking alongside a modular object oriented programming language. 


Prologue - Hacker’s Goal

PART ONE
Chapter - 1.  Legal Side of Hacking
Chapter - 2.  Hacking Environment
2.1 - Ethical Hacking and Networking
2.2 - What Does Network Mean? 
Chapter - 3.  What Is VirtualBox?
Chapter - 4.  Install Kali Linux & Other OS in VB
Chapter - 5.  Linux Terminals and Basic Functionalities

PART TWO
Chapter 6 – Role of Python in Ethical Hacking
Chapter 7 - Python environment
Chapter 8 – General Syntaxes
    8.1 - Create the main() function
    8.2 - Indentation and White Space
    8.3 – Commenting
    8.4 - Assigning Values

Chapter 9 – Variables, Objects and Values
    9.1 – Using Numbers
    9.2 – String
    9.3 - What is Type and ID
    9.4 - Logical Values
    9.5 - Tuples And Lists<
    9.6 – Dictionary
    9.7 – Object

Chapter 10 - Conditionals

Chapter 11 – How Loops Make Your Life Easier
    11.1 – While Loops
    11.2 - For Loops

Chapter 12 - Regular Expressions
    12.1 – Using ‘re’ Module
    12.2 - Reusing With Regular Expressions
    12.3 - Searching With Regular Expressions

Chapter 13 – Exceptions, Catching Errors

Chapter 14 - Functions
    14.1 - Return Values<
    14.2 - Generate Functions
    14.3 - Lists of Arguments
    14.4 - Named Arguments

Chapter 15 - Classes
    15.1 – Object Oriented Methodology
    15.2 – The Foundation of Object Orientation
    15.1 - Understanding Classes and Objects
    15.2 – Write Your Own Game “Good VS Bad”
    15.3 - Primary Class and Object
    15.4 – Accessing Object Data
    15.5 - Polymorphism
    15.6 - Using Generators
    15.7 - Inheritance
    15. 8 -Decorator

Chapter 16 - String Methods

Chapter 17 - File Input and Output

Chapter 18 - Containers
    18.1 - Operating on Tuple and List Object
    18.2 - Operating on Dictionary Object

Chapter 19 – Database
    19.1 - Let us start with SQLite3
    19.2 – MySQL for Big Project

Chapter 20 - Module
Chapter 21 – Debugging, UnitTest Module
Chapter 22 - Socket and Networking
Chapter 23 – Importing Nmap Module
Chapter 24 – Building an Nmap Network Scanner

PART THREE<

Chapter  25 - Protect Your Anonymity on Internet
Chapter  26 – Dark Web and Tor
26.1 – Hidden Wikipedia
Chapter  27 - Proxy Chains
Chapter  28 – VPN
Chapter  29 - Mac Address

Sanjib Sinha writes stories and codes - not in the same order always. He started with C# and .NET framework and won the Microsoft Community Contributor Award in 2011. Later the Open Source Software movement attracted him and he became Linux, PHP and Python enthusiast, specializing in and working on White Hat Ethical Hacking.
As a beginner he had to struggled a lot to find an easier way to learn coding. No one told him that coding is like writing - imagining a concept and making it a reality with the help of words and symbols. All through his books he has tried to help the beginners from their own perspectives.

A rare combination of ethical hacking and Python 3

Covers key concepts of security in Python 3

Includes networking concepts and Linux terminologies