爱问 爱问共享资料 爱问分类
首页 > > > [Python灰帽子:黑客与逆向工程师的Python编程之道].(Gray.Hat.Pytho…

[Python灰帽子:黑客与逆向工程师的Python编程之道].(Gray.Hat.Python).Justin.Seitz.文字版.pdf

[Python灰帽子:黑客与逆向工程师的Python编程之道]…

上传者: 智普教育python培训
638次下载 0人收藏 暂无简介 简介 2013-07-15 举报

简介:智普教育奉献,jeapedu.com 智普教育是国内最早、最专业的python + Html5就业培训教育机构。掌握Python技术是现今高薪就业的保证!智普教育亲情分享一些Python相关开发技术书籍~!欢迎下载学习

539959781593271923ISBN:978-1-59327-192-3689145719215PythonProgrammingforhackersandreverseengineersPythonisfastbecomingtheprogramminglanguageofchoiceforhackers,reverseengineers,andsoftwaretestersbecauseit’seasytowritequickly,andithasthelow-levelsupportandlibrariesthatmakehackershappy.Butuntilnow,therehasbeennorealmanualonhowtousePythonforavarietyofhackingtasks.Youhadtodigthroughforumpostsandmanpages,endlesslytweakingyourowncodetogeteverythingworking.Notanymore.GrayHatPythonexplainstheconceptsbehindhackingtoolsandtechniqueslikedebuggers,trojans,fuzzers,andemulators.ButauthorJustinSeitzgoesbeyondtheory,showingyouhowtoharnessexistingPython-basedsecuritytools—andhowtobuildyourownwhenthepre-builtoneswon’tcutit.You’lllearnhowto:>Automatetediousreversingandsecuritytasks>Designandprogramyourowndebugger>LearnhowtofuzzWindowsdriversandcreatepowerfulfuzzersfromscratch>Havefunwithcodeandlibraryinjection,softandhardhookingtechniques,andothersoftwaretrickery>Sniffsecuretrafficoutofanencryptedwebbrowsersession>UsePyDBG,ImmunityDebugger,Sulley,IDAPython,PyEMU,andmoreTheworld’sbesthackersareusingPythontodotheirhandiwork.Shouldn’tyou?Justinseitzisaseniorsecurityresearcherforimmunity,inc.,wherehespendshistimebughunting,reverseengineering,writingexploits,andcodingPython.THEFINESTINGEEKENTERTAINMENTwww.nostarch.com“ILAYFLAT.”ThisbookusesRepKover—adurablebindingthatwon’tsnapshut.grayhatPythonmastertheProfessionalhacker’sPythontoolkit$39.95($49.95CDN)shelvein:COMPUTERS/SECURiTyseitzJustinseitzgrayhatPythonGRAYHATPYTHONGRAYHATPYTHONPythonProgrammingforHackersandReverseEngineersbyJustinSeitzSanFranciscoGRAYHATPYTHON.Copyright2009byJustinSeitz.Allrightsreserved.Nopartofthisworkmaybereproducedortransmittedinanyformorbyanymeans,electronicormechanical,includingphotocopying,recording,orbyanyinformationstorageorretrievalsystem,withoutthepriorwrittenpermissionofthecopyrightownerandthepublisher.1312111009123456789ISBN-10:1-59327-192-1ISBN-13:978-1-59327-192-3Publisher:WilliamPollockProductionEditor:MeganDunchakCoverDesign:OctopodStudiosDevelopmentalEditor:TylerOrtmanTechnicalReviewer:DaveAitelCopyeditor:LindaRecktenwaldCompositors:RileyHoffmanandKathleenMishProofreader:RachelKaiIndexer:FredBrown,AllegroTechnicalIndexingForinformationonbookdistributorsortranslations,pleasecontactNoStarchPress,Inc.directly:NoStarchPress,Inc.555DeHaroStreet,Suite250,SanFrancisco,CA94107phone:415.863.9900;fax:415.863.9950;info@nostarch.com;www.nostarch.comLibraryofCongressCataloging-in-PublicationData:Seitz,Justin.GrayhatPython:Pythonprogrammingforhackersandreverseengineers/JustinSeitz.p.cm.ISBN-13:978-1-59327-192-3ISBN-10:1-59327-192-11.Computersecurity.2.Python(Computerprogramlanguage)I.Title.QA76.9.A25S4572009005.8--dc222009009107NoStarchPressandtheNoStarchPresslogoareregisteredtrademarksofNoStarchPress,Inc.Otherproductandcompanynamesmentionedhereinmaybethetrademarksoftheirrespectiveowners.Ratherthanuseatrademarksymbolwitheveryoccurrenceofatrademarkedname,weareusingthenamesonlyinaneditorialfashionandtothebenefitofthetrademarkowner,withnointentionofinfringementofthetrademark.Theinformationinthisbookisdistributedonan“AsIs”basis,withoutwarranty.Whileeveryprecautionhasbeentakeninthepreparationofthiswork,neithertheauthornorNoStarchPress,Inc.shallhaveanyliabilitytoanypersonorentitywithrespecttoanylossordamagecausedorallegedtobecauseddirectlyorindirectlybytheinformationcontainedinit.Mom,Ifthere’sonethingIwishforyoutoremember,it’sthatIloveyouverymuch.AlzheimerSocietyofCanada—www.alzheimers.caBRIEFCONTENTSForewordbyDaveAitel................................................................................................xiiiAcknowledgments........................................................................................................xviiIntroduction..................................................................................................................xixChapter1:SettingUpYourDevelopmentEnvironment.........................................................1Chapter2:DebuggersandDebuggerDesign...................................................................13Chapter3:BuildingaWindowsDebugger......................................................................25Chapter4:PyDbg—APurePythonWindowsDebugger.....................................................57Chapter5:ImmunityDebugger—TheBestofBothWorlds..................................................69Chapter6:Hooking......................................................................................................85Chapter7:DLLandCodeInjection..................................................................................97Chapter8:Fuzzing.....................................................................................................111Chapter9:Sulley........................................................................................................123Chapter10:FuzzingWindowsDrivers..........................................................................137Chapter11:IDAPython—ScriptingIDAPro....................................................................153Chapter12:PyEmu—TheScriptableEmulator.................................................................163Index.........................................................................................................................183CONTENTSINDETAILFOREWORDbyDaveAitelxiiiACKNOWLEDGMENTSxviiINTRODUCTIONxix1SETTINGUPYOURDEVELOPMENTENVIRONMENT11.1OperatingSystemRequirements.........................................................................21.2ObtainingandInstallingPython2.5...................................................................21.2.1InstallingPythononWindows............................................................21.2.2InstallingPythonforLinux..................................................................31.3SettingUpEclipseandPyDev............................................................................41.3.1TheHacker’sBestFriend:ctypes........................................................51.3.2UsingDynamicLibraries...................................................................61.3.3ConstructingCDatatypes..................................................................81.3.4PassingParametersbyReference.......................................................91.3.5DefiningStructuresandUnions..........................................................92DEBUGGERSANDDEBUGGERDESIGN132.1General-PurposeCPURegisters.........................................................................142.2TheStack.......................................................................................................162.3DebugEvents.................................................................................................182.4Breakpoints....................................................................................................182.4.1SoftBreakpoints..............................................................................192.4.2HardwareBreakpoints.....................................................................212.4.3MemoryBreakpoints.......................................................................233BUILDINGAWINDOWSDEBUGGER253.1Debuggee,WhereArtThou?............................................................................253.2ObtainingCPURegisterState...........................................................................333.2.1ThreadEnumeration........................................................................333.2.2PuttingItAllTogether.......................................................................353.3ImplementingDebugEventHandlers.................................................................393.4TheAlmightyBreakpoint..................................................................................433.4.1SoftBreakpoints..............................................................................433.4.2HardwareBreakpoints.....................................................................473.4.3MemoryBreakpoints.......................................................................523.5Conclusion.....................................................................................................55xContentsinDetail4PYDBG—APUREPYTHONWINDOWSDEBUGGER574.1ExtendingBreakpointHandlers.........................................................................584.2AccessViolationHandlers................................................................................604.3ProcessSnapshots...........................................................................................634.3.1ObtainingProcessSnapshots...........................................................634.3.2PuttingItAllTogether.......................................................................655IMMUNITYDEBUGGER—THEBESTOFBOTHWORLDS695.1InstallingImmunityDebugger............................................................................705.2ImmunityDebugger101..................................................................................705.2.1PyCommands.................................................................................715.2.2PyHooks........................................................................................715.3ExploitDevelopment........................................................................................735.3.1FindingExploit-FriendlyInstructions...................................................735.3.2Bad-CharacterFiltering....................................................................755.3.3BypassingDEPonWindows............................................................775.4DefeatingAnti-DebuggingRoutinesinMalware..................................................815.4.1IsDebuggerPresent..........................................................................815.4.2DefeatingProcessIteration...............................................................826HOOKING856.1SoftHookingwithPyDbg.................................................................................866.2HardHookingwithImmunityDebugger.............................................................907DLLANDCODEINJECTION977.1RemoteThreadCreation..................................................................................987.1.1DLLInjection...................................................................................997.1.2CodeInjection..............................................................................1017.2GettingEvil..................................................................................................1047.2.1FileHiding...................................................................................1047.2.2CodingtheBackdoor....................................................................1057.2.3Compilingwithpy2exe..................................................................1088FUZZING1118.1BugClasses.................................................................................................1128.1.1BufferOverflows...........................................................................1128.1.2IntegerOverflows.........................................................................1138.1.3FormatStringAttacks.....................................................................1148.2FileFuzzer...................................................................................................1158.3FutureConsiderations....................................................................................1228.3.1CodeCoverage............................................................................1228.3.2AutomatedStaticAnalysis..............................................................122ContentsinDetailxi9SULLEY1239.1SulleyInstallation..........................................................................................1249.2SulleyPrimitives............................................................................................1259.2.1Strings.........................................................................................1259.2.2Delimiters.....................................................................................1259.2.3StaticandRandomPrimitives..........................................................1269.2.4BinaryData..................................................................................1269.2.5Integers.......................................................................................1269.2.6BlocksandGroups........................................................................1279.3SlayingWarFTPDwithSulley.........................................................................1299.3.1FTP101.......................................................................................1299.3.2CreatingtheFTPProtocolSkeleton..................................................1309.3.3SulleySessions.............................................................................1319.3.4NetworkandProcessMonitoring....................................................1329.3.5FuzzingandtheSulleyWebInterface.............................................13310FUZZINGWINDOWSDRIVERS13710.1DriverCommunication.................................................................................13810.2DriverFuzzingwithImmunityDebugger.........................................................13910.3Driverlib—TheStaticAnalysisToolforDrivers.................................................14210.3.1DiscoveringDeviceNames..........................................................14310.3.2FindingtheIOCTLDispatchRoutine...............................................14410.3.3DeterminingSupportedIOCTLCodes............................................14510.4BuildingaDriverFuzzer..............................................................................14711IDAPYTHON—SCRIPTINGIDAPRO15311.1IDAPythonInstallation..................................................................................15411.2IDAPythonFunctions....................................................................................15511.2.1UtilityFunctions...........................................................................15511.2.2Segments...................................................................................15511.2.3Functions...................................................................................15611.2.4Cross-References.........................................................................15611.2.5DebuggerHooks.........................................................................15711.3ExampleScripts..........................................................................................15811.3.1FindingDangerousFunctionCross-References.................................15811.3.2FunctionCodeCoverage.............................................................16011.3.3CalculatingStackSize.................................................................16112PYEMU—THESCRIPTABLEEMULATOR16312.1InstallingPyEmu..........................................................................................16412.2PyEmuOverview.........................................................................................16412.2.1PyCPU.......................................................................................16412.2.2PyMemory..................................................................................16512.2.3PyEmu.......................................................................................165xiiContentsinDetail12.2.4Execution...................................................................................16512.2.5MemoryandRegisterModifiers....................................................16512.2.6Handlers....................................................................................16612.3IDAPyEmu..................................................................................................17112.3.1FunctionEmulation......................................................................17212.3.2PEPyEmu....................................................................................17512.3.3ExecutablePackers......................................................................17612.3.4UPXPacker................................................................................17612.3.5UnpackingUPXwithPEPyEmu......................................................177INDEX183FOREWORDThephrasemostoftenheardatImmunityisprobably,“Isitdoneyet?”Commonparlanceusuallygoessome-thinglikethis:“I’mstartingworkonthenewELFimporterforImmunityDebugger.”Slightpause.“Isitdoneyet?”or“IjustfoundabuginInternetExplorer!”Andthen,“Istheexploitdoneyet?”It’sthisrapidpaceofdevelopment,modi-fication,andcreationthatmakesPythontheperfectchoiceforyournextsecurityproject,beitbuildingaspecialdecompileroranentiredebugger.IfinditdizzyingsometimestowalkintoAceHardwarehereinSouthBeachandwalkdownthehammeraisle.Therearearound50differentkindsondisplay,arrangedinneatrowsinthetinystore.Eachonehassomeminorbutextremelyimportantdifferencefromthenext.I’mnotenoughofahandy-mantoknowwhattheidealuseforeachdeviceis,butthesameprincipleholdswhencreatingsecuritytools.Especiallywhenworkingonweborcustom-builtapps,eachassessmentisgoingtorequiresomekindofspecialized“hammer.”BeingabletothrowtogethersomethingthathookstheSQLAPIhassavedanImmunityteamonmorethanoneoccasion.Butofcourse,thisdoesn’tjustxivForewordapplytoassessments.OnceyoucanhooktheSQLAPI,youcaneasilywriteatooltodoanomalydetectionagainstSQLqueries,providingyourorganiza-tionwithaquickfixagainstapersistentattacker.Everyoneknowsthatit’sprettyhardtogetyoursecurityresearcherstoworkaspartofateam.Mostsecurityresearchers,whenfacedwithanysortofproblem,wouldliketofirstrebuildthelibrarytheyaregoingtousetoattacktheproblem.Let’ssayit’savulnerabilityinanSSLdaemonofsomekind.It’sverylikelythatyourresearcherisgoingtowanttos

[Python灰帽子:黑客与逆向工程师的Python编程之道].(Gray.Hat.Python).Justin.Seitz.文字版.pdf

[Python灰帽子:黑客与逆向工程师的Python编程之道]…

上传者: 智普教育python培训
638次下载 0人收藏 暂无简介 简介 2013-07-15 举报

简介:智普教育奉献,jeapedu.com 智普教育是国内最早、最专业的python + Html5就业培训教育机构。掌握Python技术是现今高薪就业的保证!智普教育亲情分享一些Python相关开发技术书籍~!欢迎下载学习

539959781593271923ISBN:978-1-59327-192-3689145719215PythonProgrammingforhackersandreverseengineersPythonisfastbecomingtheprogramminglanguageofchoiceforhackers,reverseengineers,andsoftwaretestersbecauseit’seasytowritequickly,andithasthelow-levelsupportandlibrariesthatmakehackershappy.Butuntilnow,therehasbeennorealmanualonhowtousePythonforavarietyofhackingtasks.Youhadtodigthroughforumpostsandmanpages,endlesslytweakingyourowncodetogeteverythingworking.Notanymore.GrayHatPythonexplainstheconceptsbehindhackingtoolsandtechniqueslikedebuggers,trojans,fuzzers,andemulators.ButauthorJustinSeitzgoesbeyondtheory,showingyouhowtoharnessexistingPython-basedsecuritytools—andhowtobuildyourownwhenthepre-builtoneswon’tcutit.You’lllearnhowto:>Automatetediousreversingandsecuritytasks>Designandprogramyourowndebugger>LearnhowtofuzzWindowsdriversandcreatepowerfulfuzzersfromscratch>Havefunwithcodeandlibraryinjection,softandhardhookingtechniques,andothersoftwaretrickery>Sniffsecuretrafficoutofanencryptedwebbrowsersession>UsePyDBG,ImmunityDebugger,Sulley,IDAPython,PyEMU,andmoreTheworld’sbesthackersareusingPythontodotheirhandiwork.Shouldn’tyou?Justinseitzisaseniorsecurityresearcherforimmunity,inc.,wherehespendshistimebughunting,reverseengineering,writingexploits,andcodingPython.THEFINESTINGEEKENTERTAINMENTwww.nostarch.com“ILAYFLAT.”ThisbookusesRepKover—adurablebindingthatwon’tsnapshut.grayhatPythonmastertheProfessionalhacker’sPythontoolkit$39.95($49.95CDN)shelvein:COMPUTERS/SECURiTyseitzJustinseitzgrayhatPythonGRAYHATPYTHONGRAYHATPYTHONPythonProgrammingforHackersandReverseEngineersbyJustinSeitzSanFranciscoGRAYHATPYTHON.Copyright2009byJustinSeitz.Allrightsreserved.Nopartofthisworkmaybereproducedortransmittedinanyformorbyanymeans,electronicormechanical,includingphotocopying,recording,orbyanyinformationstorageorretrievalsystem,withoutthepriorwrittenpermissionofthecopyrightownerandthepublisher.1312111009123456789ISBN-10:1-59327-192-1ISBN-13:978-1-59327-192-3Publisher:WilliamPollockProductionEditor:MeganDunchakCoverDesign:OctopodStudiosDevelopmentalEditor:TylerOrtmanTechnicalReviewer:DaveAitelCopyeditor:LindaRecktenwaldCompositors:RileyHoffmanandKathleenMishProofreader:RachelKaiIndexer:FredBrown,AllegroTechnicalIndexingForinformationonbookdistributorsortranslations,pleasecontactNoStarchPress,Inc.directly:NoStarchPress,Inc.555DeHaroStreet,Suite250,SanFrancisco,CA94107phone:415.863.9900;fax:415.863.9950;info@nostarch.com;www.nostarch.comLibraryofCongressCataloging-in-PublicationData:Seitz,Justin.GrayhatPython:Pythonprogrammingforhackersandreverseengineers/JustinSeitz.p.cm.ISBN-13:978-1-59327-192-3ISBN-10:1-59327-192-11.Computersecurity.2.Python(Computerprogramlanguage)I.Title.QA76.9.A25S4572009005.8--dc222009009107NoStarchPressandtheNoStarchPresslogoareregisteredtrademarksofNoStarchPress,Inc.Otherproductandcompanynamesmentionedhereinmaybethetrademarksoftheirrespectiveowners.Ratherthanuseatrademarksymbolwitheveryoccurrenceofatrademarkedname,weareusingthenamesonlyinaneditorialfashionandtothebenefitofthetrademarkowner,withnointentionofinfringementofthetrademark.Theinformationinthisbookisdistributedonan“AsIs”basis,withoutwarranty.Whileeveryprecautionhasbeentakeninthepreparationofthiswork,neithertheauthornorNoStarchPress,Inc.shallhaveanyliabilitytoanypersonorentitywithrespecttoanylossordamagecausedorallegedtobecauseddirectlyorindirectlybytheinformationcontainedinit.Mom,Ifthere’sonethingIwishforyoutoremember,it’sthatIloveyouverymuch.AlzheimerSocietyofCanada—www.alzheimers.caBRIEFCONTENTSForewordbyDaveAitel................................................................................................xiiiAcknowledgments........................................................................................................xviiIntroduction..................................................................................................................xixChapter1:SettingUpYourDevelopmentEnvironment.........................................................1Chapter2:DebuggersandDebuggerDesign...................................................................13Chapter3:BuildingaWindowsDebugger......................................................................25Chapter4:PyDbg—APurePythonWindowsDebugger.....................................................57Chapter5:ImmunityDebugger—TheBestofBothWorlds..................................................69Chapter6:Hooking......................................................................................................85Chapter7:DLLandCodeInjection..................................................................................97Chapter8:Fuzzing.....................................................................................................111Chapter9:Sulley........................................................................................................123Chapter10:FuzzingWindowsDrivers..........................................................................137Chapter11:IDAPython—ScriptingIDAPro....................................................................153Chapter12:PyEmu—TheScriptableEmulator.................................................................163Index.........................................................................................................................183CONTENTSINDETAILFOREWORDbyDaveAitelxiiiACKNOWLEDGMENTSxviiINTRODUCTIONxix1SETTINGUPYOURDEVELOPMENTENVIRONMENT11.1OperatingSystemRequirements.........................................................................21.2ObtainingandInstallingPython2.5...................................................................21.2.1InstallingPythononWindows............................................................21.2.2InstallingPythonforLinux..................................................................31.3SettingUpEclipseandPyDev............................................................................41.3.1TheHacker’sBestFriend:ctypes........................................................51.3.2UsingDynamicLibraries...................................................................61.3.3ConstructingCDatatypes..................................................................81.3.4PassingParametersbyReference.......................................................91.3.5DefiningStructuresandUnions..........................................................92DEBUGGERSANDDEBUGGERDESIGN132.1General-PurposeCPURegisters.........................................................................142.2TheStack.......................................................................................................162.3DebugEvents.................................................................................................182.4Breakpoints....................................................................................................182.4.1SoftBreakpoints..............................................................................192.4.2HardwareBreakpoints.....................................................................212.4.3MemoryBreakpoints.......................................................................233BUILDINGAWINDOWSDEBUGGER253.1Debuggee,WhereArtThou?............................................................................253.2ObtainingCPURegisterState...........................................................................333.2.1ThreadEnumeration........................................................................333.2.2PuttingItAllTogether.......................................................................353.3ImplementingDebugEventHandlers.................................................................393.4TheAlmightyBreakpoint..................................................................................433.4.1SoftBreakpoints..............................................................................433.4.2HardwareBreakpoints.....................................................................473.4.3MemoryBreakpoints.......................................................................523.5Conclusion.....................................................................................................55xContentsinDetail4PYDBG—APUREPYTHONWINDOWSDEBUGGER574.1ExtendingBreakpointHandlers.........................................................................584.2AccessViolationHandlers................................................................................604.3ProcessSnapshots...........................................................................................634.3.1ObtainingProcessSnapshots...........................................................634.3.2PuttingItAllTogether.......................................................................655IMMUNITYDEBUGGER—THEBESTOFBOTHWORLDS695.1InstallingImmunityDebugger............................................................................705.2ImmunityDebugger101..................................................................................705.2.1PyCommands.................................................................................715.2.2PyHooks........................................................................................715.3ExploitDevelopment........................................................................................735.3.1FindingExploit-FriendlyInstructions...................................................735.3.2Bad-CharacterFiltering....................................................................755.3.3BypassingDEPonWindows............................................................775.4DefeatingAnti-DebuggingRoutinesinMalware..................................................815.4.1IsDebuggerPresent..........................................................................815.4.2DefeatingProcessIteration...............................................................826HOOKING856.1SoftHookingwithPyDbg.................................................................................866.2HardHookingwithImmunityDebugger.............................................................907DLLANDCODEINJECTION977.1RemoteThreadCreation..................................................................................987.1.1DLLInjection...................................................................................997.1.2CodeInjection..............................................................................1017.2GettingEvil..................................................................................................1047.2.1FileHiding...................................................................................1047.2.2CodingtheBackdoor....................................................................1057.2.3Compilingwithpy2exe..................................................................1088FUZZING1118.1BugClasses.................................................................................................1128.1.1BufferOverflows...........................................................................1128.1.2IntegerOverflows.........................................................................1138.1.3FormatStringAttacks.....................................................................1148.2FileFuzzer...................................................................................................1158.3FutureConsiderations....................................................................................1228.3.1CodeCoverage............................................................................1228.3.2AutomatedStaticAnalysis..............................................................122ContentsinDetailxi9SULLEY1239.1SulleyInstallation..........................................................................................1249.2SulleyPrimitives............................................................................................1259.2.1Strings.........................................................................................1259.2.2Delimiters.....................................................................................1259.2.3StaticandRandomPrimitives..........................................................1269.2.4BinaryData..................................................................................1269.2.5Integers.......................................................................................1269.2.6BlocksandGroups........................................................................1279.3SlayingWarFTPDwithSulley.........................................................................1299.3.1FTP101.......................................................................................1299.3.2CreatingtheFTPProtocolSkeleton..................................................1309.3.3SulleySessions.............................................................................1319.3.4NetworkandProcessMonitoring....................................................1329.3.5FuzzingandtheSulleyWebInterface.............................................13310FUZZINGWINDOWSDRIVERS13710.1DriverCommunication.................................................................................13810.2DriverFuzzingwithImmunityDebugger.........................................................13910.3Driverlib—TheStaticAnalysisToolforDrivers.................................................14210.3.1DiscoveringDeviceNames..........................................................14310.3.2FindingtheIOCTLDispatchRoutine...............................................14410.3.3DeterminingSupportedIOCTLCodes............................................14510.4BuildingaDriverFuzzer..............................................................................14711IDAPYTHON—SCRIPTINGIDAPRO15311.1IDAPythonInstallation..................................................................................15411.2IDAPythonFunctions....................................................................................15511.2.1UtilityFunctions...........................................................................15511.2.2Segments...................................................................................15511.2.3Functions...................................................................................15611.2.4Cross-References.........................................................................15611.2.5DebuggerHooks.........................................................................15711.3ExampleScripts..........................................................................................15811.3.1FindingDangerousFunctionCross-References.................................15811.3.2FunctionCodeCoverage.............................................................16011.3.3CalculatingStackSize.................................................................16112PYEMU—THESCRIPTABLEEMULATOR16312.1InstallingPyEmu..........................................................................................16412.2PyEmuOverview.........................................................................................16412.2.1PyCPU.......................................................................................16412.2.2PyMemory..................................................................................16512.2.3PyEmu.......................................................................................165xiiContentsinDetail12.2.4Execution...................................................................................16512.2.5MemoryandRegisterModifiers....................................................16512.2.6Handlers....................................................................................16612.3IDAPyEmu..................................................................................................17112.3.1FunctionEmulation......................................................................17212.3.2PEPyEmu....................................................................................17512.3.3ExecutablePackers......................................................................17612.3.4UPXPacker................................................................................17612.3.5UnpackingUPXwithPEPyEmu......................................................177INDEX183FOREWORDThephrasemostoftenheardatImmunityisprobably,“Isitdoneyet?”Commonparlanceusuallygoessome-thinglikethis:“I’mstartingworkonthenewELFimporterforImmunityDebugger.”Slightpause.“Isitdoneyet?”or“IjustfoundabuginInternetExplorer!”Andthen,“Istheexploitdoneyet?”It’sthisrapidpaceofdevelopment,modi-fication,andcreationthatmakesPythontheperfectchoiceforyournextsecurityproject,beitbuildingaspecialdecompileroranentiredebugger.IfinditdizzyingsometimestowalkintoAceHardwarehereinSouthBeachandwalkdownthehammeraisle.Therearearound50differentkindsondisplay,arrangedinneatrowsinthetinystore.Eachonehassomeminorbutextremelyimportantdifferencefromthenext.I’mnotenoughofahandy-mantoknowwhattheidealuseforeachdeviceis,butthesameprincipleholdswhencreatingsecuritytools.Especiallywhenworkingonweborcustom-builtapps,eachassessmentisgoingtorequiresomekindofspecialized“hammer.”BeingabletothrowtogethersomethingthathookstheSQLAPIhassavedanImmunityteamonmorethanoneoccasion.Butofcourse,thisdoesn’tjustxivForewordapplytoassessments.OnceyoucanhooktheSQLAPI,youcaneasilywriteatooltodoanomalydetectionagainstSQLqueries,providingyourorganiza-tionwithaquickfixagainstapersistentattacker.Everyoneknowsthatit’sprettyhardtogetyoursecurityresearcherstoworkaspartofateam.Mostsecurityresearchers,whenfacedwithanysortofproblem,wouldliketofirstrebuildthelibrarytheyaregoingtousetoattacktheproblem.Let’ssayit’savulnerabilityinanSSLdaemonofsomekind.It’sverylikelythatyourresearcherisgoingtowanttos
  • 相关资料
  • 该用户的其他资料
  • 名称/格式
  • 下载次数
  • 资料大小
  • 名称/格式
  • 下载次数
  • 资料大小
  • 平时整理的一些Python基础内容以及语法测试样例,供初学者参考,水平有限不吝赐教,欢迎下载。[立即查看]

  • 平时整理的一些基础内容以及语法测试样例,水平有限不吝赐教,欢迎下载。 \r\n第一次用Latex写,难免有些瑕疵,见谅。 \r\n准备用2年慢慢整理出第一版。 \r\n现在的是early_release版。[立即查看]

  • 智普教育奉献,jeapedu.com 智普教育是国内最早、最专业的python + Html5就业培训教育机构。掌握Python技术是现今高薪就业的保证!智普教育亲情分享一些Python相关开发技术书籍~!欢迎下载学习![立即查看]

  • 智普教育奉献,jeapedu.com 智普教育是国内最早、最专业的python + Html5就业培训教育机构。掌握Python技术是现今高薪就业的保证!智普教育亲情分享一些Python相关开发技术书籍~!欢迎下载学习![立即查看]

  • 智普教育奉献,jeapedu.com 智普教育是国内最早、最专业的python + Html5就业培训教育机构。掌握Python技术是现今高薪就业的保证!智普教育亲情分享一些Python相关开发技术书籍~!欢迎下载学习![立即查看]

  • 智普教育奉献,jeapedu.com 智普教育是国内最早、最专业的python + Html5就业培训教育机构。掌握Python技术是现今高薪就业的保证!智普教育亲情分享一些Python相关开发技术书籍~!欢迎下载学习![立即查看]

  • 智普教育奉献,jeapedu.com 智普教育是国内最早、最专业的python + Html5就业培训教育机构。掌握Python技术是现今高薪就业的保证!智普教育亲情分享一些Python相关开发技术书籍~!欢迎下载学习![立即查看]

  • 智普教育奉献,jeapedu.com 智普教育是国内最早、最专业的python + Html5就业培训教育机构。掌握Python技术是现今高薪就业的保证!智普教育亲情分享一些Python相关开发技术书籍~!欢迎下载学习![立即查看]

  • 智普教育奉献,jeapedu.com 智普教育是国内最早、最专业的python + Html5就业培训教育机构。掌握Python技术是现今高薪就业的保证!智普教育亲情分享一些Python相关开发技术书籍~!欢迎下载学习![立即查看]

  • 智普教育奉献,jeapedu.com 智普教育是国内最早、最专业的python + Html5就业培训教育机构。掌握Python技术是现今高薪就业的保证!智普教育亲情分享一些Python相关开发技术书籍~!欢迎下载学习![立即查看]

  • 智普教育奉献,jeapedu.com 智普教育是国内最早、最专业的python + Html5就业培训教育机构。掌握Python技术是现今高薪就业的保证!智普教育亲情分享一些Python相关开发技术书籍~!欢迎下载学习![立即查看]

  • 智普教育奉献,jeapedu.com 智普教育是国内最早、最专业的python + Html5就业培训教育机构。掌握Python技术是现今高薪就业的保证!智普教育亲情分享一些Python相关开发技术书籍~!欢迎下载学习![立即查看]

  • 268
    10.6MB

    智普教育奉献,jeapedu.com 智普教育是国内最早、最专业的python + Html5就业培训教育机构。掌握Python技术是现今高薪就业的保证!智普教育亲情分享一些Python相关开发技术书籍~!欢迎下载学习![立即查看]

  • 智普教育奉献,jeapedu.com 智普教育是国内最早、最专业的python + Html5就业培训教育机构。掌握Python技术是现今高薪就业的保证!智普教育亲情分享一些Python相关开发技术书籍~!欢迎下载学习![立即查看]

  • 智普教育奉献,jeapedu.com 智普教育是国内最早、最专业的python + Html5就业培训教育机构。掌握Python技术是现今高薪就业的保证!智普教育亲情分享一些Python相关开发技术书籍~!欢迎下载学习![立即查看]

  • 242
    10.1MB

    智普教育奉献,jeapedu.com 智普教育是国内最早、最专业的python + Html5就业培训教育机构。掌握Python技术是现今高薪就业的保证!智普教育亲情分享一些Python相关开发技术书籍~!欢迎下载学习![立即查看]

  • 智普教育奉献,jeapedu.com 智普教育是国内最早、最专业的python + Html5就业培训教育机构。掌握Python技术是现今高薪就业的保证!智普教育亲情分享一些Python相关开发技术书籍~!欢迎下载学习![立即查看]

  • 智普教育奉献,jeapedu.com 智普教育是国内最早、最专业的python + Html5就业培训教育机构。掌握Python技术是现今高薪就业的保证!智普教育亲情分享一些Python相关开发技术书籍~!欢迎下载学习![立即查看]

  • 智普教育奉献,jeapedu.com 智普教育是国内最早、最专业的python + Html5就业培训教育机构。掌握Python技术是现今高薪就业的保证!智普教育亲情分享一些Python相关开发技术书籍~!欢迎下载学习![立即查看]

用户评论

0/200
暂无评论
上传我的资料
关闭

请选择举报的类型

关闭

提示

提交成功!

感谢您对爱问共享资料的支持,我们将尽快核实并处理您的举报信息。

关闭

提示

提交失败!

您的举报信息提交失败,请重试!

关闭

提示

重复举报!

亲爱的用户!感觉您对爱问共享资料的支持,请勿重复举报噢!

全屏 缩小 放大
收藏
资料评价:

/ 220
所需积分:0 立即下载
返回
顶部
举报
资料
关闭

温馨提示

感谢您对爱问共享资料的支持,精彩活动将尽快为您呈现,敬请期待!