Skip to Content
Python for Offensive PenTest
book

Python for Offensive PenTest

by Hussam Khrais
April 2018
Intermediate to advanced content levelIntermediate to advanced
176 pages
4h 16m
English
Packt Publishing
Content preview from Python for Offensive PenTest

Firefox process

We will debug and get inside the Firefox process now. Then, we will intercept the API calls for a specific Function inside a DLL module:

This is the DLL and we will perform intercepting for a specific Function inside the DLL. After that, we will extract data and continue the flow. In summary, the steps for doing so are as follows:

  1. Get the process ID of the browser process.
  2. Attach our debugger to this process ID.
  3. Specify the DLL library that we want to intercept, as well as the function name inside the DLL. Keep in mind that we need to know the memory address of the function so that we can continue the flow after intercepting. ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Python Penetration Testing Cookbook

Python Penetration Testing Cookbook

Rejah Rehim

Publisher Resources

ISBN: 9781788838979Supplemental Content