Skip to main content

Understanding Network Hacks

Attack and Defense with Python

  • Book
  • © 2015

Overview

  • Hacks proven in real life networks
  • Practical source code samples
  • Just code and explanations
  • Includes supplementary material: sn.pub/extras

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (10 chapters)

Keywords

About this book

This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore the reader will be introduced to defense methods such as intrusion detection and prevention systems and log file analysis by diving into code.

Reviews

“This book offers a set of tools written in the Python programming language that can be used to test network vulnerabilities. … This book would be of value to those who are interested in network security and penetration testing at the code level. … And if one has the necessary background, the book can be very useful to take this knowledge to a deeper level in the nuts and bolts of how this stuff really works.” (J. M. Artz, Computing Reviews, August, 2015)

Authors and Affiliations

  • Uster, Switzerland

    Bastian Ballmann

About the author

Bastian Ballmann is a professional programmer, system engineer and member of the Chaos Computer Club since 2002. He holds lectures on network hijacking attacks as well as Bluetooth hacking and is the author of various security related tools like P.A.T.H., Blue diving and Chaosmap. In his free time he also writes the German Datenterrorist Blog and produced the podcasts Freibyte and Gesprächssituation about computer and security related stuff.

Bibliographic Information

Publish with us