Gray Hat Python

Gray Hat Python pdf epub mobi txt 电子书 下载 2025

出版者:No Starch Press
作者:Justin Seitz
出品人:
页数:232
译者:
出版时间:2009-4-23
价格:USD 39.95
装帧:Paperback
isbn号码:9781593271923
丛书系列:
图书标签:
  • python
  • 安全
  • Programming
  • Security
  • hacker
  • Python
  • 程序设计
  • 逆向工程
  • Python
  • 安全
  • 渗透测试
  • 黑帽
  • 逆向工程
  • 网络安全
  • 编程
  • 恶意软件
  • 取证
  • 漏洞利用
想要找书就要到 小美书屋
立刻按 ctrl+D收藏本页
你会得到大惊喜!!

具体描述

Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write quickly, and it has the low-level support and libraries that make hackers happy. But until now, there has been no real manual on how to use Python for a variety of hacking tasks. You had to dig through forum posts and man pages, endlessly tweaking your own code to get everything working. Not anymore. "Gray Hat Python" explains the concepts behind hacking tools and techniques like debuggers, trojans, fuzzers, and emulators. But author Justin Seitz goes beyond theory, showing you how to harness existing Python-based security tools - and how to build your own when the pre-built ones won't cut it. You'll learn how to: Automate tedious reversing and security tasks Design and program your own debugger Learn how to fuzz Windows drivers and create powerful fuzzers from scratch Have fun with code and library injection, soft and hard hooking techniques, and other software trickery Sniff secure traffic out of an encrypted web browser session Use PyDBG, Immunity Debugger, Sulley, IDAPython, PyEMU, and more The world's best hackers are using Python to do their handiwork. Shouldn't you?

作者简介

Justin Seitz is a Senior Security Researcher for Immunity, Inc., where he spends a great deal of time bughunting, reverse engineering, and doing Python development and malware analysis.

目录信息

Introduction
Chapter 1: Setting Up Your Development Environment
Chapter 2: Debuggers and Debugger Design
Chapter 3: Building a Windows Debugger
Chapter 4: PYDBG: A Pure Python Windows Debugger
Chapter 5: Immunity Debugger: The Best of Both Worlds
Chapter 6: Hooking
Chapter 7: DLL and Code Injection
Chapter 8: Fuzzing
Chapter 9: Sulley
Chapter 10: Fuzzing Windows Drivers
Chapter 11: IDAPython—Scripting IDAPro
Chapter 12: Pyemu—The Scriptable Emulator
Index
· · · · · · (收起)

读后感

评分

其实基本上就是ctype加各种废话 (为了满足字数要求) 其实基本上就是ctype加各种废话 其实基本上就是ctype加各种废话 其实基本上就是ctype加各种废话 其实基本上就是ctype加各种废话 其实基本上就是ctype加各种废话 其实基本上就是ctype加各种废话 其实基本上就是ctype加各种...  

评分

from ctypes import * kernel = windll.kernel32 advapi = windll.advapi32 HANDLE = c_void_p TOKEN_ADJUST_PRIVILEGES = 0x0020 h_token = HANDLE() if advapi.OpenProcessToken(kernel.GetCurrentProcess(), TOKEN_ADJUST_PRIVILEGES , byref(h_token)): print("OK"...  

评分

这么书其实作用就只是把你领进门,修行还是要靠个人的。 这本书的作用其实完全能够达到上面的这个目的,对不熟悉这一领域的人,能够很通俗易懂的把你领进门了。 对于书中存在的一些问题,确实是如其他网友所说的,排版存在些问题,校对存在一些问题,但是在原理说明上,是没存...  

评分

书刚看到第三章, 写的还是不错, 像我这种水平比较差的, 觉得讲的深浅合适, 比看深入理解计算机系统之类的书要好看的多(看那本我总是要睡着....) 但翻译的水平还是比较一般的, 不光是代码的缩进没有整理, 而且很明显代码没有自己敲进电脑里看看. 第三章开篇的CreateProcessA这...  

评分

from ctypes import * kernel = windll.kernel32 advapi = windll.advapi32 HANDLE = c_void_p TOKEN_ADJUST_PRIVILEGES = 0x0020 h_token = HANDLE() if advapi.OpenProcessToken(kernel.GetCurrentProcess(), TOKEN_ADJUST_PRIVILEGES , byref(h_token)): print("OK"...  

用户评价

评分

整本书,就是走马观花

评分

整本书,就是走马观花

评分

你必须对py和C都已经很熟悉,至少已经能帮作者除错才能看这个,靠这个熟悉py肯定是没戏。

评分

非常不错,可以自己的实践少了些

评分

相当不错的书,翻译的其实挺好 挺顺的,翻译到这程度,已经在国内的翻译书来说,算是相当好的。而那一点点的小错误 我觉得是不可避免的,根本不影响阅读,瑕不掩玉而且译者或者编者也对一些译者注的地方也挺细心的。本书能够把不熟悉自动化逆向的人带进门,并且让大家对调试器有直观的认识

本站所有内容均为互联网搜索引擎提供的公开搜索信息,本站不存储任何数据与内容,任何内容与数据均与本站无关,如有需要请联系相关搜索引擎包括但不限于百度google,bing,sogou

© 2025 book.quotespace.org All Rights Reserved. 小美书屋 版权所有