- Main
- Computers - Networking
- Black Hat Python, 2nd Edition
Black Hat Python, 2nd Edition
Justin Seitz & Tim ArnoldBu kitabı nə dərəcədə bəyəndiniz?
Yüklənmiş faylın keyfiyyəti necədir?
Kitabın keyfiyyətini qiymətləndirə bilmək üçün onu yükləyin
Yüklənmiş faylların keyfiyyəti necədir?
When it comes to creating powerful and effective hacking tools,
Python is the language of choice for most security analysts. In this
second edition of the bestsellingBlack Hat Python,
you’ll explore the darker side of Python’s capabilities: everything
from writing network sniffers, stealing email credentials, and
bruteforcing directories to crafting mutation fuzzers, investigating
virtual machines, and creating stealthy trojans.
All of the code in this edition has been updated toPython 3.x.
You’ll also find new coverage of bit shifting, code hygiene, and
offensive forensics with the Volatility Framework as well as expanded
explanations of the Python libraries ctypes, struct, lxml, and
BeautifulSoup, and offensive hacking strategies like splitting bytes,
leveraging computer vision libraries, and scraping websites.
You’ll even learn how to:
• Create a trojan command-and-control server using GitHub
• Detect sandboxing and automate common malware tasks like keylogging and screenshotting
• Extend the Burp Suite web-hacking tool
• Escalate Windows privileges with creative process control
• Use offensive memory forensics tricks to retrieve password hashes and find vulnerabilities on a virtual machine
• Abuse Windows COM automation
• Exfiltrate data from a network undetected
Python is the language of choice for most security analysts. In this
second edition of the bestsellingBlack Hat Python,
you’ll explore the darker side of Python’s capabilities: everything
from writing network sniffers, stealing email credentials, and
bruteforcing directories to crafting mutation fuzzers, investigating
virtual machines, and creating stealthy trojans.
All of the code in this edition has been updated toPython 3.x.
You’ll also find new coverage of bit shifting, code hygiene, and
offensive forensics with the Volatility Framework as well as expanded
explanations of the Python libraries ctypes, struct, lxml, and
BeautifulSoup, and offensive hacking strategies like splitting bytes,
leveraging computer vision libraries, and scraping websites.
You’ll even learn how to:
• Create a trojan command-and-control server using GitHub
• Detect sandboxing and automate common malware tasks like keylogging and screenshotting
• Extend the Burp Suite web-hacking tool
• Escalate Windows privileges with creative process control
• Use offensive memory forensics tricks to retrieve password hashes and find vulnerabilities on a virtual machine
• Abuse Windows COM automation
• Exfiltrate data from a network undetected
Kateqoriyalar:
İl:
2021
Nəşriyyat:
No Starch Press
Dil:
english
ISBN 10:
1718501129
ISBN 13:
9781718501126
Fayl:
PDF, 3.65 MB
Sizin teqləriniz:
IPFS:
CID , CID Blake2b
english, 2021
Kitab mağazasını əlavə etmək istəyirsiniz? Bizimlə support@z-lib.do ilə əlaqə saxlayın
1-5 dəqiqə ərzində e-poçtunuz bərpa olunacadır.
1-5 dəqiqə ərzində fayl sizin Telegram akkauntunuza çatdırılacaq.
Diqqət: Hesabınızı Z-Library Telegram botuna bağladığınızdan əmin olun.
1-5 dəqiqə ərzində fayl Kindle cihazınıza çatdırılacaq.
Qeyd: Kindle-yə göndərdiyiniz hər kitabı verifikasiyadan keçirməlisiniz. Amazon Kindle Support-dan təsdiq məktubunu aldığınıza dair e-poçt ünvanınızı yoxlayın.
formatına konvertasiya yerinə yetirilir
formatına konvertasiya baş tutmadı
Premium statusun üstünlükləri
- Elektron oxuculara göndərin
- Artırılmış yükləmə limiti
- Faylları çevirin
- Daha çox axtarış nəticəsi
- Digər üstünlüklər