This book includes almost everything you need to start a job as a Python instructor.
Learn how to make a password generator in Python with the ability to choose the length of each character type using the built-in random, string and argparse modules. Password generators are tools that allow the user to create random and customized strong passwords based on preferences. In this tutorial, we will make a command-line tool in Python for generating passwords. We will use the argparse module to make it easier to parse the command line arguments the user has provided.
Learn how you can make a DHCP listener by sniffing DHCP packets in the network using the Scapy library in Python. Dynamic Host Configuration Protocol (DHCP) is a network protocol that provides clients connected to a network to obtain TCP/IP configuration information (such as the private IP address) from a DHCP server. A DHCP server (can be an access point, router, or configured in a server) dynamically assigns an IP address and other configuration parameters to each device connected to the network. The DHCP protocol uses User Datagram Protocol (UDP) to perform the communication between the server and clients. It is implemented with two port numbers: UDP port number 67 for the server and UDP port number 68 for the client. In this tutorial, we will make a simple DHCP listener using the Scapy library in Python. In other words, we'll be able to listen for DHCP packets in the network and extract valuable information whenever a device connects to the network we're in.
Author(s): Tony Snake
Publisher: Independently published
Year: 2022
Language: English
Pages: 289
1. Make a Password Generator in Python
2. Make a DHCP Listener using Scapy in Python
3. Inject Code into HTTP Responses in the Network in Python
4. MAC Address Changer
5. Extract Saved WiFi Passwords
6. Extract Chrome Cookies
7. HTTP Proxy
8. Shodan API
9. Extract Chrome Passwords
10. SYN Flooding Attack
11. SQL Injection Scanner
12. Crack PDF Files
13. Brute Force ZIP File Passwords
14. WiFi Scanner
15. XSS Vulnerability Scanner
16. Brute-Force SSH Servers
17. Hide Data in Images
18. Subdomain Scanner
19. Extract All Website Links
20. Encrypt and Decrypt Files
21. Reverse Shell
22. Sniff HTTP Packets
23. Disconnect Devices from Wi-Fi
24. DNS Spoof attack
25. Make a Keylogger
26. Detect ARP Spoof Attack
27. Build an ARP Spoofer
28. Make a Network Scanner