Chapter 2

Penetration Testing with Python

Information in this chapter:

ent Building a Port Scanner

ent Constructing an SSH Botnet

ent Mass Compromise with FTP

ent Replicate Conficker

ent Your Own Zero Day Attack

To be a warrior is not a simple matter of wishing to be one. ...

Get Violent Python now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.