est arena for a hacker. An attacker can do
have no tools to execute network attacks. No netcat.
one. However, you might be surprised to find that
in many cases, you’ll have a Python install. So that’s
10
Chapter 2
This chapter will give you some basics on Python networking using the
socket
1
module. Along the way, we’ll build clients, servers, and a TCP proxy.
We’ll then turn them into our very own netcat, complete with a command
shell. This chapter is the foundation for subsequent chapters, in which we’ll
build a host discovery tool, implement cross-platform sniffers, and create a
remote trojan framework. Let’s get started.
Do'stlaringiz bilan baham: