Skip to Content
Python for Offensive PenTest
book

Python for Offensive PenTest

by Hussam Khrais
April 2018
Intermediate to advanced content levelIntermediate to advanced
176 pages
4h 16m
English
Packt Publishing
Content preview from Python for Offensive PenTest

Bypassing host-based firewalls

In all our previous chapters, we assumed that any process on the target machine can initiate a session to the internet without any restrictions. Now, in many enterprise networks, they don't rely on the built-in Windows Firewall. Instead, they use an advanced host-based firewall to limit what process can initiate a session to the internet, just like how the access lists work. So, for instance, let's assume that the system administrator has allowed only some business-needed processes to access the internet. For example, let's say that the system administrator allowed the Windows update and the antivirus update, as well as the most common browsers, such as Chrome, Internet Explorer, and Firefox. So, only these ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Python Penetration Testing Cookbook

Python Penetration Testing Cookbook

Rejah Rehim

Publisher Resources

ISBN: 9781788838979Supplemental Content