- Main
- Computers - Networking
- Black Hat Python, 2nd Edition
Black Hat Python, 2nd Edition
Justin Seitz & Tim ArnoldQuanto Você gostou deste livro?
Qual é a qualidade do ficheiro descarregado?
Descarregue o livro para avaliar a sua qualidade
De que qualidade são os ficheiros descarregados?
When it comes to creating powerful and effective hacking tools,
Python is the language of choice for most security analysts. In this
second edition of the bestsellingBlack Hat Python,
you’ll explore the darker side of Python’s capabilities: everything
from writing network sniffers, stealing email credentials, and
bruteforcing directories to crafting mutation fuzzers, investigating
virtual machines, and creating stealthy trojans.
All of the code in this edition has been updated toPython 3.x.
You’ll also find new coverage of bit shifting, code hygiene, and
offensive forensics with the Volatility Framework as well as expanded
explanations of the Python libraries ctypes, struct, lxml, and
BeautifulSoup, and offensive hacking strategies like splitting bytes,
leveraging computer vision libraries, and scraping websites.
You’ll even learn how to:
• Create a trojan command-and-control server using GitHub
• Detect sandboxing and automate common malware tasks like keylogging and screenshotting
• Extend the Burp Suite web-hacking tool
• Escalate Windows privileges with creative process control
• Use offensive memory forensics tricks to retrieve password hashes and find vulnerabilities on a virtual machine
• Abuse Windows COM automation
• Exfiltrate data from a network undetected
Python is the language of choice for most security analysts. In this
second edition of the bestsellingBlack Hat Python,
you’ll explore the darker side of Python’s capabilities: everything
from writing network sniffers, stealing email credentials, and
bruteforcing directories to crafting mutation fuzzers, investigating
virtual machines, and creating stealthy trojans.
All of the code in this edition has been updated toPython 3.x.
You’ll also find new coverage of bit shifting, code hygiene, and
offensive forensics with the Volatility Framework as well as expanded
explanations of the Python libraries ctypes, struct, lxml, and
BeautifulSoup, and offensive hacking strategies like splitting bytes,
leveraging computer vision libraries, and scraping websites.
You’ll even learn how to:
• Create a trojan command-and-control server using GitHub
• Detect sandboxing and automate common malware tasks like keylogging and screenshotting
• Extend the Burp Suite web-hacking tool
• Escalate Windows privileges with creative process control
• Use offensive memory forensics tricks to retrieve password hashes and find vulnerabilities on a virtual machine
• Abuse Windows COM automation
• Exfiltrate data from a network undetected
Categorias:
Ano:
2021
Editora:
No Starch Press
Idioma:
english
ISBN 10:
1718501129
ISBN 13:
9781718501126
Arquivo:
PDF, 3.65 MB
As suas tags:
IPFS:
CID , CID Blake2b
english, 2021
O arquivo será enviado para o email durante 1-5 minutos.
O arquivo será enviado a você através do Messenger Telegram. Pode levar de 1 a 5 minutos antes de recebê-lo.
NOTA: Verifique se você ligou a sua conta ao Telegram Bot da Z-Library.
O arquivo será enviado para sua conta do Kindle. Pode levar de 1 a 5 minutos antes de recebê-lo.
Nota: Você precisa verificar cada livro que envia para o Kindle. Verifique sua caixa de e-mail para um e-mail de confirmação do Amazon Kindle Support.
A converter para
Conversão para falhou
Benefícios do estatuto premium
- Envie para leitores eletrónicos
- Limite aumentado de download
- Converter ficheiros
- Mais resultados de pesquisa
- Outros benefícios