Beginning Ethical Hacking with Python.
All about ethical hacking. it just information and for knowledge.
■Part I
■Chapter 1: Legal Side of Hacking
■Chapter 2: Hacking Environment
Ethical Hacking and Networking
What Does Network Mean?
Summary
■Chapter 3: Installing Virtual Box
■Chapter 4: Installing Kali Linux and
Other Operating Systems on VB
■Chapter 5: Linux Terminal, Basic Commands
Summary
■Part II
■Chapter 6: Python 3 and Ethical Hacking
■Chapter 7: Python Environment
■Chapter 8: General Syntaxes
Create the main( ) function
Indentation and White Space
Commenting
Assigning Values
■Chapter 9: Variables, Objects and Values
Using Numbers
String
What is Type and ID
Logical Values 59
Tuples And Lists.
Dictionary
Object
■Chapter 10: Conditionals
■Chapter 11: Loops
While Loops
For Loops
■Chapter 12: Regular Expressions
Using “re” Module
Reusing With Regular Expressions
Searching with Regular Expressions
■Chapter 13: Exceptions, Catching Errors
■Chapter 14: Functions
Return Values
Generate Functions
Lists of Arguments
Named Arguments
■Chapter 15: Classes
Object-Oriented Methodology
The Foundation of Object Orientation
Understanding Classes and Objects
Write Your Own Game, “Good Vs Bad”
Primary Class and Object
Accessing Object Data
Polymorphism
Using Generators
Inheritance
Decorator
■Chapter 16: String Methods
■Chapter 17: File Input And Output
■Chapter 18: Containers
Operating on Tuple and List Object
Operating on Dictionary Object
■Chapter 19: Database
Let us start with SQLite3.
MySQL for Big Project
■Chapter 20: Module
■Chapter 21: Debugging, Unittest Module
■Chapter 22: Socket and Networking
■Chapter 23: Importing Nmap Module
■Chapter 24: Building an Nmap Network Scanner
■Part III
■Chapter 25: Protect Anonymity on the Internet
■Chapter 26: Dark Web and Tor
Hidden Wikipedia
■Chapter 27: Proxy Chains
■Chapter 28: Virtual Private Network or VPN
■Chapter 29: MAC Address
■Epilogue—What Next
What's Your Reaction?






