首页 [Python灰帽子:黑客与逆向工程师的Python编程之道].(Gray.Hat.Pytho…

[Python灰帽子:黑客与逆向工程师的Python编程之道].(Gray.Hat.Python).Justin.Seitz.文字版.pdf

[Python灰帽子:黑客与逆向工程师的Python编程之道]…

上传者: 智普教育python培训 2013-07-15 评分1 评论0 下载641 收藏0 阅读量1445 暂无简介 简介 举报

简介:本文档为《[Python灰帽子:黑客与逆向工程师的Python编程之道].(Gray.Hat.Python).Justin.Seitz.文字版pdf》,可适用于IT书籍领域,主题内容包含ISBN:PythonProgrammingforhackersandreverseengineersPythonisfastbecomingthe符等。

ISBN:PythonProgrammingforhackersandreverseengineersPythonisfastbecomingtheprogramminglanguageofchoiceforhackers,reverseengineers,andsoftwaretestersbecauseit’seasytowritequickly,andithasthelowlevelsupportandlibrariesthatmakehackershappyButuntilnow,therehasbeennorealmanualonhowtousePythonforavarietyofhackingtasksYouhadtodigthroughforumpostsandmanpages,endlesslytweakingyourowncodetogeteverythingworkingNotanymoreGrayHatPythonexplainstheconceptsbehindhackingtoolsandtechniqueslikedebuggers,trojans,fuzzers,andemulatorsButauthorJustinSeitzgoesbeyondtheory,showingyouhowtoharnessexistingPythonbasedsecuritytoolsandhowtobuildyourownwhentheprebuiltoneswon’tcutitYou’lllearnhowto:>Automatetediousreversingandsecuritytasks>Designandprogramyourowndebugger>LearnhowtofuzzWindowsdriversandcreatepowerfulfuzzersfromscratch>Havefunwithcodeandlibraryinjection,softandhardhookingtechniques,andothersoftwaretrickery>Sniffsecuretrafficoutofanencryptedwebbrowsersession>UsePyDBG,ImmunityDebugger,Sulley,IDAPython,PyEMU,andmoreTheworld’sbesthackersareusingPythontodotheirhandiworkShouldn’tyouJustinseitzisaseniorsecurityresearcherforimmunity,inc,wherehespendshistimebughunting,reverseengineering,writingexploits,andcodingPythonTHEFINESTINGEEKENTERTAINMENTwwwnostarchcom“ILAYFLAT”ThisbookusesRepKoveradurablebindingthatwon’tsnapshutgrayhatPythonmastertheProfessionalhacker’sPythontoolkit$($CDN)shelvein:COMPUTERSSECURiTyseitzJustinseitzgrayhatPythonGRAYHATPYTHONGRAYHATPYTHONPythonProgrammingforHackersandReverseEngineersbyJustinSeitzSanFranciscoGRAYHATPYTHONCopyrightbyJustinSeitzAllrightsreservedNopartofthisworkmaybereproducedortransmittedinanyformorbyanymeans,electronicormechanical,includingphotocopying,recording,orbyanyinformationstorageorretrievalsystem,withoutthepriorwrittenpermissionofthecopyrightownerandthepublisherISBN:ISBN:Publisher:WilliamPollockProductionEditor:MeganDunchakCoverDesign:OctopodStudiosDevelopmentalEditor:TylerOrtmanTechnicalReviewer:DaveAitelCopyeditor:LindaRecktenwaldCompositors:RileyHoffmanandKathleenMishProofreader:RachelKaiIndexer:FredBrown,AllegroTechnicalIndexingForinformationonbookdistributorsortranslations,pleasecontactNoStarchPress,Incdirectly:NoStarchPress,IncDeHaroStreet,Suite,SanFrancisco,CAphone:fax:infonostarchcomwwwnostarchcomLibraryofCongressCataloginginPublicationData:Seitz,JustinGrayhatPython:PythonprogrammingforhackersandreverseengineersJustinSeitzpcmISBN:ISBN:ComputersecurityPython(Computerprogramlanguage)ITitleQAASdcNoStarchPressandtheNoStarchPresslogoareregisteredtrademarksofNoStarchPress,IncOtherproductandcompanynamesmentionedhereinmaybethetrademarksoftheirrespectiveownersRatherthanuseatrademarksymbolwitheveryoccurrenceofatrademarkedname,weareusingthenamesonlyinaneditorialfashionandtothebenefitofthetrademarkowner,withnointentionofinfringementofthetrademarkTheinformationinthisbookisdistributedonan“AsIs”basis,withoutwarrantyWhileeveryprecautionhasbeentakeninthepreparationofthiswork,neithertheauthornorNoStarchPress,IncshallhaveanyliabilitytoanypersonorentitywithrespecttoanylossordamagecausedorallegedtobecauseddirectlyorindirectlybytheinformationcontainedinitMom,Ifthere’sonethingIwishforyoutoremember,it’sthatIloveyouverymuchAlzheimerSocietyofCanadawwwalzheimerscaBRIEFCONTENTSForewordbyDaveAitelxiiiAcknowledgmentsxviiIntroductionxixChapter:SettingUpYourDevelopmentEnvironmentChapter:DebuggersandDebuggerDesignChapter:BuildingaWindowsDebuggerChapter:PyDbgAPurePythonWindowsDebuggerChapter:ImmunityDebuggerTheBestofBothWorldsChapter:HookingChapter:DLLandCodeInjectionChapter:FuzzingChapter:SulleyChapter:FuzzingWindowsDriversChapter:IDAPythonScriptingIDAProChapter:PyEmuTheScriptableEmulatorIndexCONTENTSINDETAILFOREWORDbyDaveAitelxiiiACKNOWLEDGMENTSxviiINTRODUCTIONxixSETTINGUPYOURDEVELOPMENTENVIRONMENTOperatingSystemRequirementsObtainingandInstallingPythonInstallingPythononWindowsInstallingPythonforLinuxSettingUpEclipseandPyDevTheHacker’sBestFriend:ctypesUsingDynamicLibrariesConstructingCDatatypesPassingParametersbyReferenceDefiningStructuresandUnionsDEBUGGERSANDDEBUGGERDESIGNGeneralPurposeCPURegistersTheStackDebugEventsBreakpointsSoftBreakpointsHardwareBreakpointsMemoryBreakpointsBUILDINGAWINDOWSDEBUGGERDebuggee,WhereArtThouObtainingCPURegisterStateThreadEnumerationPuttingItAllTogetherImplementingDebugEventHandlersTheAlmightyBreakpointSoftBreakpointsHardwareBreakpointsMemoryBreakpointsConclusionxContentsinDetailPYDBGAPUREPYTHONWINDOWSDEBUGGERExtendingBreakpointHandlersAccessViolationHandlersProcessSnapshotsObtainingProcessSnapshotsPuttingItAllTogetherIMMUNITYDEBUGGERTHEBESTOFBOTHWORLDSInstallingImmunityDebuggerImmunityDebuggerPyCommandsPyHooksExploitDevelopmentFindingExploitFriendlyInstructionsBadCharacterFilteringBypassingDEPonWindowsDefeatingAntiDebuggingRoutinesinMalwareIsDebuggerPresentDefeatingProcessIterationHOOKINGSoftHookingwithPyDbgHardHookingwithImmunityDebuggerDLLANDCODEINJECTIONRemoteThreadCreationDLLInjectionCodeInjectionGettingEvilFileHidingCodingtheBackdoorCompilingwithpyexeFUZZINGBugClassesBufferOverflowsIntegerOverflowsFormatStringAttacksFileFuzzerFutureConsiderationsCodeCoverageAutomatedStaticAnalysisContentsinDetailxiSULLEYSulleyInstallationSulleyPrimitivesStringsDelimitersStaticandRandomPrimitivesBinaryDataIntegersBlocksandGroupsSlayingWarFTPDwithSulleyFTPCreatingtheFTPProtocolSkeletonSulleySessionsNetworkandProcessMonitoringFuzzingandtheSulleyWebInterfaceFUZZINGWINDOWSDRIVERSDriverCommunicationDriverFuzzingwithImmunityDebuggerDriverlibTheStaticAnalysisToolforDriversDiscoveringDeviceNamesFindingtheIOCTLDispatchRoutineDeterminingSupportedIOCTLCodesBuildingaDriverFuzzerIDAPYTHONSCRIPTINGIDAPROIDAPythonInstallationIDAPythonFunctionsUtilityFunctionsSegmentsFunctionsCrossReferencesDebuggerHooksExampleScriptsFindingDangerousFunctionCrossReferencesFunctionCodeCoverageCalculatingStackSizePYEMUTHESCRIPTABLEEMULATORInstallingPyEmuPyEmuOverviewPyCPUPyMemoryPyEmuxiiContentsinDetailExecutionMemoryandRegisterModifiersHandlersIDAPyEmuFunctionEmulationPEPyEmuExecutablePackersUPXPackerUnpackingUPXwithPEPyEmuINDEXFOREWORDThephrasemostoftenheardatImmunityisprobably,“Isitdoneyet”Commonparlanceusuallygoessomethinglikethis:“I’mstartingworkonthenewELFimporterforImmunityDebugger”Slightpause“Isitdoneyet”or“IjustfoundabuginInternetExplorer!”Andthen,“Istheexploitdoneyet”It’sthisrapidpaceofdevelopment,modification,andcreationthatmakesPythontheperfectchoiceforyournextsecurityproject,beitbuildingaspecialdecompileroranentiredebuggerIfinditdizzyingsometimestowalkintoAceHardwarehereinSouthBeachandwalkdownthehammeraisleTherearearounddifferentkindsondisplay,arrangedinneatrowsinthetinystoreEachonehassomeminorbutextremelyimportantdifferencefromthenextI’mnotenoughofahandymantoknowwhattheidealuseforeachdeviceis,butthesameprincipleholdswhencreatingsecuritytoolsEspeciallywhenworkingonweborcustombuiltapps,eachassessmentisgoingtorequiresomekindofspecialized“hammer”BeingabletothrowtogethersomethingthathookstheSQLAPIhassavedanImmunityteamonmorethanoneoccasionButofcourse,thisdoesn’tjustxivForewordapplytoassessmentsOnceyoucanhooktheSQLAPI,youcaneasilywriteatooltodoanomalydetectionagainstSQLqueries,providingyourorganizationwithaquickfixagainstapersistentattackerEveryoneknowsthatit’sprettyhardtogetyoursecurityresearcherstoworkaspartofateamMostsecurityresearchers,whenfacedwithanysortofproblem,wouldliketofirstrebuildthelibrarytheyaregoingtousetoattacktheproblemLet’ssayit’savulnerabilityinanSSLdaemonofsomekindIt’sverylikelythatyourresearcherisgoingtowanttos

职业精品

产品销售合同 范本.doc

产品销售总代理协议.docx

最全面的经销商授权代理合同.docx

电脑产品销售合同范本.doc

用户评论

0/200
    暂无评论
上传我的资料

精彩专题

相关资料换一换

资料评价:

/ 220
所需积分:0 立即下载

意见
反馈

返回
顶部