investigation report

Topics: Java, Object-oriented programming, Scripting language Pages: 2 (736 words) Published: December 16, 2013
BOOK REVIEW
Violent Python - A cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers.

This 250+ page handbook is divided into seven chapters, which is ideal for either an advanced undergraduate or graduate course in security. At the heart of this handbook is how we utilize Python to build our own customize tools for forensic purposes. As cyber-attacks are evolving from time to time, we should arm ourselves with customized tools to handle all kind of situations. Chapter 1 introduces Python languages and provides background information about it, such as variables, data types and functions. Then, it guides reader to create a few simple programs using Python. Chapter 2 focuses on penetration testing by using self-made Python tools to script attacks. The author strongly emphasized on the importance of writing your own Python tools for penetration testing. In this chapter the author will guide through the steps to build a port scanner, SSH Botnet and Zero-Day Attack all by using Python for penetration testing purpose. Also, ways to attack SSH, FTP and SMB protocols are also included in this chapter. In Chapter 3 of this book, it mainly focus on the application of python in the forensic field. This chapter included the scripting method and coding to retrieve mac addresses and physical location. Python also can used to recover the geo-locate (Wigle Mac). This chapter also covered the title on how to find deleted item in using OS module. By using the Windows SID to translate user name all the deleted files, which is still in, recycle bin based on each user will be readable. On the other hand, metadata extraction can be done using python library named, "pyPdf". By using the EXIF tool included in the python-imaging library, metadata of the EXIF file can be retrieved. Artifacts can be easily found in each application, therefore python codes to review the application artifacts are provided. Chapter 3 has provided a set of method to...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Recommendation Report Essay
  • Report Writing Essay
  • How do I write a report Essay
  • Essay about Impormal Report
  • Essay on incident report
  • Format of Report Essay
  • Business Report Essay
  • Essay about Siwes Report

Become a StudyMode Member

Sign Up - It's Free