Книга: Black Hat Python: Python Programming for Hackers and Pentesters
Назад: 1. Setting Up Your Python Environment
Дальше: 3. The Network: Raw Sockets and Sniffing

] module. Along the way, we’ll build clients, servers, and a TCP proxy; and then turn them into our very own netcat, complete with command shell. ):

]

).

shows this in action.

). This on my Linux server, I connect to the web server at 192.168.100.128 through the SSH tunnel, as shown in .

] The full socket documentation can be found here: .

[] This discussion expands on the work by Hussam Khrais, which can be found on .

© RuTLib.com 2015-2018