Python is quick changing into the programming language of alternative for hackers, reverse engineers, and software program testers as a result of it’s simple to put in writing shortly, and it has the low-level assist and libraries that make hackers blissful. However till now, there was no actual guide on easy methods to use Python for quite a lot of hacking duties. You needed to dig by way of discussion board posts and man pages, endlessly tweaking your individual code to get every little thing working. Not anymore.
Grey Hat Python is a transparent winner within the subject of books for safety professionals. Written for individuals who wish to transfer into the hacking and penetration testing fields and absolutely perceive what they’re doing, this e book will problem readers to shortly come in control not simply on how hackers work, however easy methods to construct their very own instruments. It comprises loads of examples that present precisely what one must do with code that builds on itself as you develop in ability, plus loads of introductory materials. Most chapters additionally embrace a “Kicking the Tires” part on placing the brand new instruments to make use of. For those who learn this e book cover-to-cover, you received’t come to the tip of it with no deep understanding of how your techniques work, why hacking is feasible, and how one can construct your individual hacking and safety testing instruments with Python and add-on instruments.
Grey Hat Python explains the ideas behind hacking instruments and strategies like debuggers, trojans, fuzzers, and emulators. However creator Justin Seitz goes past concept, exhibiting you easy methods to harness current Python-based safety instruments – and easy methods to construct your individual when the pre-built ones received’t lower it.
You’ll discover ways to:
- Automate tedious reversing and safety duties
- Design and program your individual debugger
- Learn to fuzz Home windows drivers and create highly effective fuzzers from scratch
- Have enjoyable with code and library injection, tender and laborious hooking strategies, and different software program trickery
- Sniff safe visitors out of an encrypted net browser session
- Use PyDBG, Immunity Debugger, Sulley, IDAPython, PyEMU, and extra
The world’s greatest hackers are utilizing Python to do their handiwork. Shouldn’t you?
Desk of contents
Chapter 1: Setting Up Your Improvement Surroundings
Chapter 2: Debuggers and Debugger Design
Chapter three: Constructing a Home windows Debugger
Chapter four: PYDBG: A Pure Python Home windows Debugger
Chapter 5: Immunity Debugger: The Better of Each Worlds
Chapter 6: Hooking
Chapter 7: DLL and Code Injection
Chapter eight: Fuzzing
Chapter 9: Sulley
Chapter 10: Fuzzing Home windows Drivers
Chapter 11: IDAPython—Scripting IDAPro
Chapter 12: Pyemu—The Scriptable Emulator
Obtain Hyperlinks :
Mirror 1 : Mediafire
Mirror 2 : 4Shared
Morror three : Gdrive
Copyright 2017 NETWORKFIGHTS.COM