Have you seen the film “The Matrix Reloaded”? Well, if you had seen you would have probably recalled the scene where the character Trinity was seen using NMAP to hack the system of a power plant.
This book is all about Scanning, Networking and Information Gathering with the help of Python programming language and by the way teaches you major steps of Ethical Hacking.
# Epilogue
# PART LEGAL SIDE, CYBER CRIME AND NETWORKING
# Chapter 1 – Legal Side of Hacking
# Chapter 2 – Examples of Crime ## 2.1 – Black Money and Bitcoin ## 2.2 The Great Cyber Robberies ## 2.3 - Biggest Data Heist ## 2.4 – Battleground for Women
# Chapter 3 – Hacking and Networking ## 3.1 - What Does Network Mean?
#PART PYTHON AND HACKING
# Chapter 4 – Object in Python
# Chapter 5 – Conditionals
# Chapter 6 – Loops ## 6.1 – While Loops ## 6.2 - For Loops
# Chapter 7 - Regular Expressions ## 7.1 – Using ‘re’ Module ## 7.2 - Reusing With Regular Expressions ## 7.3 - Search With Regular Expressions