Black Hat Python
python programming for hackers and pentesters
Justin Seitz
"Perbedaan antara script kiddies dan profesional adalah perbedaan antara hanya menggunakan alat orang lain dan menulis sendiri."
-Charlie Miller, dari Kata Pengantar
In Black Hat Python, yang terbaru dari Justin Seitz (penulis terlaris Gray Hat Python), Anda akan menjelajahi sisi gelap dari Python (bukan ularrrr meski saya sangat menyukai ular... hihihi...) dengan kemampuan sniffer jaringan, memanipulasi paket, menginfeksi mesin virtual, menciptakan trojan secara diam diam, dan lebih banyak lagi. dalam ebook ini Anda akan belajar bagaimana untuk (bukan kue... wkakakakkaka...) :
- => Membuat Command-dan-Control trojan menggunakan GitHub
- => Mendeteksi sandboxing dan mengotomatisasi tugas-tugas malware yang mainstream, seperti keylogging dan screenshotting
- => Meningkat hak istimewa dengan Windows kontrol proses kreatif
- => Gunakan ofensif forensik memori trik untuk mengambil hash password dan menyuntikkan shellcode ke mesin virtual (saya suka yang ini... hihihihi...)
- => Memperpanjang Burp Suite tools web-hacking populer
- => Abuse Windows COM automation to perform a man-in-the-browser attack
- => Exfiltrate data dari jaringan yang paling sneakily
- => Teknik Insider dan tantangan kreatif menunjukkan seluruh cara untuk memperpanjang hacks dan bagaimana menulis eksploitasi sendiri (asikkkk...).
Ketika anda datang ke dalam keamanan ofensif, kemampuan Anda untuk menciptakan alat yang kuat dengan waktu yang cepat sangat diperlukan. Pelajari cara nya di Black Hat Python.
tentang Penulis
Justin Seitz adalah peneliti senior keamanan untuk Imunitas, Inc, di mana ia menghabiskan waktunya untuk berburu bug (bukan serangga hewan... ya... wakakkakaka...), reverse engineering, menulis eksploitasi, dan coding Python. Dia adalah penulis Gray Hat Python , buku pertama yang dibuat untuk menutupi Python untuk analisis keamanan.
Daftar isi
Pengantar
Bab 1: Menyiapkan Python Lingkungan Anda
Bab 2: Jaringan: Dasar-Dasar
Bab 3: Jaringan: Socket Raw dan Sniffing
Bab 4: Memiliki Jaringan dengan scapy
Bab 5: Web Hackery
Bab 6: Memperluas Burp Proxy
Bab 7: GitHub Komando dan Pengendalian
Bab 8: Common Trojaning Tugas pada Windows
Bab 9: Fun Dengan Internet Explorer
Bab 10: Windows Privilege Eskalasi
Bab 11: Otomatisasi Serangan Forensik
Indeks
Melihat rinci Daftar Isi (PDF)
Melihat Index (PDF)
Reviews
"Another incredible Python book. With a minor tweak or two many of these programs will have at least a ten year shelf life, and that is rare for a security book."
—Stephen Northcutt, founding president of the SANS Technology Institute
"A great book using Python for offensive security purposes."
—Andrew Case, Volatility core developer and coauthor of The Art of Memory Forensics
"If you truly have a hacker's mindset, a spark is all you need to make it your own and do something even more amazing. Justin Seitz offers plenty of sparks."
—Ethical Hacker ( Read More )
"Whether you're interested in becoming a serious hacker/penetration tester or just want to know how they work, this book is one you need to read. Intense, technically sound, and eye-opening."
—Sandra Henry-Stocker, IT World ( Read More )
"Definitely a recommended read for the technical security professional with some basic previous exposure to Python."
—Richard Austin, IEEE Cipher ( Read More )
"A well-written book that will put you on track to being able to write powerful—and potentially scary—tools. It's up to you to use them for good."
—Steve Mansfield-Devine, editor of Elsevier's Network Security Newsletter
"A well implemented read with lots of good ideas for fun offensive Python projects. So enjoy, and don't forget it's all about the code!"
—Dan Borges, LockBoxx
"A useful eye-opener."
—MagPi Magazine
"Another incredible Python book. With a minor tweak or two many of these programs will have at least a ten year shelf life, and that is rare for a security book."
—Stephen Northcutt, founding president of the SANS Technology Institute
"A great book using Python for offensive security purposes."
—Andrew Case, Volatility core developer and coauthor of The Art of Memory Forensics
"If you truly have a hacker's mindset, a spark is all you need to make it your own and do something even more amazing. Justin Seitz offers plenty of sparks."
—Ethical Hacker ( Read More )
"Whether you're interested in becoming a serious hacker/penetration tester or just want to know how they work, this book is one you need to read. Intense, technically sound, and eye-opening."
—Sandra Henry-Stocker, IT World ( Read More )
"Definitely a recommended read for the technical security professional with some basic previous exposure to Python."
—Richard Austin, IEEE Cipher ( Read More )
"A well-written book that will put you on track to being able to write powerful—and potentially scary—tools. It's up to you to use them for good."
—Steve Mansfield-Devine, editor of Elsevier's Network Security Newsletter
"A well implemented read with lots of good ideas for fun offensive Python projects. So enjoy, and don't forget it's all about the code!"
—Dan Borges, LockBoxx
"A useful eye-opener."
—MagPi Magazine
No comments:
Post a Comment