Prix bas
CHF42.00
Habituellement expédié sous 4 à 9 semaines.
The first book to explain the Python language specifically for hackers, reverse engineers, and software security analysts. - The only book to cover the use of Python for security analysis - Python is becoming the scripting language of choice for hackers - Discusses a variety of open source Python tools and how to extend them
Informationen zum Autor Justin Seitz is a senior security researcher for Immunity, Inc., where he spends his time bug hunting, reverse engineering, writing exploits, and coding Python. He is the author of Black Hat Python (No Starch Press). Klappentext Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write quickly, and it has the low-level support and libraries that make hackers happy. But until now, there has been no real manual on how to use Python for a variety of hacking tasks. You had to dig through forum posts and man pages, endlessly tweaking your own code to get everything working. Not anymore. Gray Hat Python explains the concepts behind hacking tools and techniques like debuggers, trojans, fuzzers, and emulators. But author Justin Seitz goes beyond theory, showing you how to harness existing Python-based security toolsand how to build your own when the pre-built ones won't cut it. You'll learn how to: -Automate tedious reversing and security tasks -Design and program your own debugger -Learn how to fuzz Windows drivers and create powerful fuzzers from scratch -Have fun with code and library injection, soft and hard hooking techniques, and other software trickery -Sniff secure traffic out of an encrypted web browser session -Use PyDBG, Immunity Debugger, Sulley, IDAPython, PyEMU, and more The world's best hackers are using Python to do their handiwork. Shouldn't you? Zusammenfassung Python is fast becoming the programming language of choice for hackers! reverse engineers! and software testers because it's easy to write quickly! and it has the low-level support and libraries that make hackers happy. But until now! there has been no real manual on how to use Python for a variety of hacking tasks. You had to dig through forum posts and man pages! endlessly tweaking your own code to get everything working. Not anymore. Gray Hat Python explains the concepts behind hacking tools and techniques like debuggers! trojans! fuzzers! and emulators. But author Justin Seitz goes beyond theory! showing you how to harness existing Python-based security toolsand how to build your own when the pre-built ones won't cut it. You'll learn how to: Automate tedious reversing and security tasks Design and program your own debugger Learn how to fuzz Windows drivers and create powerful fuzzers from scratch Have fun with code and library injection! soft and hard hooking techniques! and other software trickery Sniff secure traffic out of an encrypted web browser session Use PyDBG! Immunity Debugger! Sulley! IDAPython! PyEMU! and more The world's best hackers are using Python to do their handiwork. Shouldn't you? Inhaltsverzeichnis Introduction Chapter 1: Setting Up Your Development Environment Chapter 2: Debuggers and Debugger Design Chapter 3: Building a Windows Debugger Chapter 4: PYDBG: A Pure Python Windows Debugger Chapter 5: Immunity Debugger: The Best of Both Worlds Chapter 6: Hooking Chapter 7: DLL and Code Injection Chapter 8: Fuzzing Chapter 9: Sulley Chapter 10: Fuzzing Windows Drivers Chapter 11: IDAPythonScripting IDAPro Chapter 12: PyemuThe Scriptable Emulator Index...
Texte du rabat
Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write quickly, and it has the low-level support and libraries that make hackers happy. But until now, there has been no real manual on how to use Python for a variety of hacking tasks. You had to dig through forum posts and man pages, endlessly tweaking your own code to get everything working. Not anymore.
Gray Hat Python explains the concepts behind hacking tools and techniques like debuggers, trojans, fuzzers, and emulators. But author Justin Seitz goes beyond theory, showing you how to harness existing Python-based security tools—and how to build your own when the pre-built ones won't cut it.
You'll learn how to:
-Automate tedious reversing and security tasks
-Design and program your own debugger
-Learn how to fuzz Windows drivers and create powerful fuzzers from scratch
-Have fun with code and library injection, soft and hard hooking techniques, and other software trickery
-Sniff secure traffic out of an encrypted web browser session
-Use PyDBG, Immunity Debugger, Sulley, IDAPython, PyEMU, and more
The world's best hackers are using Python to do their handiwork. Shouldn't you?
Contenu
Introduction
Chapter 1: Setting Up Your Development Environment
Chapter 2: Debuggers and Debugger Design
Chapter 3: Building a Windows Debugger
Chapter 4: PYDBG: A Pure Python Windows Debugger
Chapter 5: Immunity Debugger: The Best of Both Worlds
Chapter 6: Hooking
Chapter 7: DLL and Code Injection
Chapter 8: Fuzzing
Chapter 9: Sulley
Chapter 10: Fuzzing Windows Drivers
Chapter 11: IDAPython—Scripting IDAPro
Chapter 12: Pyemu—The Scriptable Emulator
Index