- Main
- Computers - Networking
- Black Hat Python, 2nd Edition
Black Hat Python, 2nd Edition
Justin Seitz & Tim ArnoldAvez-vous aimé ce livre?
Quelle est la qualité du fichier téléchargé?
Veuillez télécharger le livre pour apprécier sa qualité
Quelle est la qualité des fichiers téléchargés?
When it comes to creating powerful and effective hacking tools,
Python is the language of choice for most security analysts. In this
second edition of the bestsellingBlack Hat Python,
you’ll explore the darker side of Python’s capabilities: everything
from writing network sniffers, stealing email credentials, and
bruteforcing directories to crafting mutation fuzzers, investigating
virtual machines, and creating stealthy trojans.
All of the code in this edition has been updated toPython 3.x.
You’ll also find new coverage of bit shifting, code hygiene, and
offensive forensics with the Volatility Framework as well as expanded
explanations of the Python libraries ctypes, struct, lxml, and
BeautifulSoup, and offensive hacking strategies like splitting bytes,
leveraging computer vision libraries, and scraping websites.
You’ll even learn how to:
• Create a trojan command-and-control server using GitHub
• Detect sandboxing and automate common malware tasks like keylogging and screenshotting
• Extend the Burp Suite web-hacking tool
• Escalate Windows privileges with creative process control
• Use offensive memory forensics tricks to retrieve password hashes and find vulnerabilities on a virtual machine
• Abuse Windows COM automation
• Exfiltrate data from a network undetected
Python is the language of choice for most security analysts. In this
second edition of the bestsellingBlack Hat Python,
you’ll explore the darker side of Python’s capabilities: everything
from writing network sniffers, stealing email credentials, and
bruteforcing directories to crafting mutation fuzzers, investigating
virtual machines, and creating stealthy trojans.
All of the code in this edition has been updated toPython 3.x.
You’ll also find new coverage of bit shifting, code hygiene, and
offensive forensics with the Volatility Framework as well as expanded
explanations of the Python libraries ctypes, struct, lxml, and
BeautifulSoup, and offensive hacking strategies like splitting bytes,
leveraging computer vision libraries, and scraping websites.
You’ll even learn how to:
• Create a trojan command-and-control server using GitHub
• Detect sandboxing and automate common malware tasks like keylogging and screenshotting
• Extend the Burp Suite web-hacking tool
• Escalate Windows privileges with creative process control
• Use offensive memory forensics tricks to retrieve password hashes and find vulnerabilities on a virtual machine
• Abuse Windows COM automation
• Exfiltrate data from a network undetected
Catégories:
Année:
2021
Editeur::
No Starch Press
Langue:
english
ISBN 10:
1718501129
ISBN 13:
9781718501126
Fichier:
PDF, 3.65 MB
Vos balises:
IPFS:
CID , CID Blake2b
english, 2021
Le fichier sera envoyé à votre adresse de courriel dans 1 à 5 minutes.
Dans 1-5 minutes, le fichier sera delivré à votre compte Telegram.
Note : Assurez-vous que vous avez lié votre compte au bot Telegram de Z-Library.
Dans 1-5 minutes, le fichier sera delivré à votre appareil Kindle.
Remarque: vous devez valider chaque livre avant de l'envoyer à Kindle. Veuillez vérifier votre messagerie pour voir le mail avec la confirmation par Amazon Kindle Support.
La conversion en est effectuée
La conversion en a échoué
Avantages du statut Premium
- Envoyez aux e-lecteurs
- Limite de téléchargement augmentée
- Convertissez des fichiers
- Plus de résultats de recherche
- Autres avantages