Demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. This book shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices.
Violent Python shows you how to move from a theoretical understanding of offensive computing to a practical implementation of offensive computing. The book focuses specifically on penetration testing, nefarious web activities, and forensic, wireless and network analysis using the Python programming language. You will learn and understand how to create software that attacks various computer systems, forensically analyzes digital evidence, and creates programs that target wireless and mobile devices. Specific hands-on examples include using the radio on a mobile phone, automating the process of breaking into several computers simultaneously, and data mining on social networking sites. Written as a cookbook for pen testers, this book shows how to exploit networks and build pen testing tools, allowing readers to think like attackers and defend their systems.