关闭

关闭

封号提示

内容

首页 Python灰帽子:黑客与逆向工程师的Python编程之道.pdf

Python灰帽子:黑客与逆向工程师的Python编程之道.pdf

Python灰帽子:黑客与逆向工程师的Python编程之道.p…

上传者: 智普教育python培训 2013-07-15 评分 5 0 319 44 1450 暂无简介 简介 举报

简介:本文档为《Python灰帽子:黑客与逆向工程师的Python编程之道pdf》,可适用于IT/计算机领域,主题内容包含ISBN:PythonProgrammingforhackersandreverseengineersPythonisfastbecomingthe符等。

ISBN:PythonProgrammingforhackersandreverseengineersPythonisfastbecomingtheprogramminglanguageofchoiceforhackers,reverseengineers,andsoftwaretestersbecauseit’seasytowritequickly,andithasthelowlevelsupportandlibrariesthatmakehackershappyButuntilnow,therehasbeennorealmanualonhowtousePythonforavarietyofhackingtasksYouhadtodigthroughforumpostsandmanpages,endlesslytweakingyourowncodetogeteverythingworkingNotanymoreGrayHatPythonexplainstheconceptsbehindhackingtoolsandtechniqueslikedebuggers,trojans,fuzzers,andemulatorsButauthorJustinSeitzgoesbeyondtheory,showingyouhowtoharnessexistingPythonbasedsecuritytoolsandhowtobuildyourownwhentheprebuiltoneswon’tcutitYou’lllearnhowto:>Automatetediousreversingandsecuritytasks>Designandprogramyourowndebugger>LearnhowtofuzzWindowsdriversandcreatepowerfulfuzzersfromscratch>Havefunwithcodeandlibraryinjection,softandhardhookingtechniques,andothersoftwaretrickery>Sniffsecuretrafficoutofanencryptedwebbrowsersession>UsePyDBG,ImmunityDebugger,Sulley,IDAPython,PyEMU,andmoreTheworld’sbesthackersareusingPythontodotheirhandiworkShouldn’tyouJustinseitzisaseniorsecurityresearcherforimmunity,inc,wherehespendshistimebughunting,reverseengineering,writingexploits,andcodingPythonTHEFINESTINGEEKENTERTAINMENTwwwnostarchcom“ILAYFLAT”ThisbookusesRepKoveradurablebindingthatwon’tsnapshutgrayhatPythonmastertheProfessionalhacker’sPythontoolkit$($CDN)shelvein:COMPUTERSSECURiTyseitzJustinseitzgrayhatPythonGRAYHATPYTHONGRAYHATPYTHONPythonProgrammingforHackersandReverseEngineersbyJustinSeitzSanFranciscoGRAYHATPYTHONCopyrightbyJustinSeitzAllrightsreservedNopartofthisworkmaybereproducedortransmittedinanyformorbyanymeans,electronicormechanical,includingphotocopying,recording,orbyanyinformationstorageorretrievalsystem,withoutthepriorwrittenpermissionofthecopyrightownerandthepublisherISBN:ISBN:Publisher:WilliamPollockProductionEditor:MeganDunchakCoverDesign:OctopodStudiosDevelopmentalEditor:TylerOrtmanTechnicalReviewer:DaveAitelCopyeditor:LindaRecktenwaldCompositors:RileyHoffmanandKathleenMishProofreader:RachelKaiIndexer:FredBrown,AllegroTechnicalIndexingForinformationonbookdistributorsortranslations,pleasecontactNoStarchPress,Incdirectly:NoStarchPress,IncDeHaroStreet,Suite,SanFrancisco,CAphone:fax:infonostarchcomwwwnostarchcomLibraryofCongressCataloginginPublicationData:Seitz,JustinGrayhatPython:PythonprogrammingforhackersandreverseengineersJustinSeitzpcmISBN:ISBN:ComputersecurityPython(Computerprogramlanguage)ITitleQAASdcNoStarchPressandtheNoStarchPresslogoareregisteredtrademarksofNoStarchPress,IncOtherproductandcompanynamesmentionedhereinmaybethetrademarksoftheirrespectiveownersRatherthanuseatrademarksymbolwitheveryoccurrenceofatrademarkedname,weareusingthenamesonlyinaneditorialfashionandtothebenefitofthetrademarkowner,withnointentionofinfringementofthetrademarkTheinformationinthisbookisdistributedonan“AsIs”basis,withoutwarrantyWhileeveryprecautionhasbeentakeninthepreparationofthiswork,neithertheauthornorNoStarchPress,IncshallhaveanyliabilitytoanypersonorentitywithrespecttoanylossordamagecausedorallegedtobecauseddirectlyorindirectlybytheinformationcontainedinitMom,Ifthere’sonethingIwishforyoutoremember,it’sthatIloveyouverymuchAlzheimerSocietyofCanadawwwalzheimerscaBRIEFCONTENTSForewordbyDaveAitelxiiiAcknowledgmentsxviiIntroductionxixChapter:SettingUpYourDevelopmentEnvironmentChapter:DebuggersandDebuggerDesignChapter:BuildingaWindowsDebuggerChapter:PyDbgAPurePythonWindowsDebuggerChapter:ImmunityDebuggerTheBestofBothWorldsChapter:HookingChapter:DLLandCodeInjectionChapter:FuzzingChapter:SulleyChapter:FuzzingWindowsDriversChapter:IDAPythonScriptingIDAProChapter:PyEmuTheScriptableEmulatorIndexCONTENTSINDETAILFOREWORDbyDaveAitelxiiiACKNOWLEDGMENTSxviiINTRODUCTIONxixSETTINGUPYOURDEVELOPMENTENVIRONMENTOperatingSystemRequirementsObtainingandInstallingPythonInstallingPythononWindowsInstallingPythonforLinuxSettingUpEclipseandPyDevTheHacker’sBestFriend:ctypesUsingDynamicLibrariesConstructingCDatatypesPassingParametersbyReferenceDefiningStructuresandUnionsDEBUGGERSANDDEBUGGERDESIGNGeneralPurposeCPURegistersTheStackDebugEventsBreakpointsSoftBreakpointsHardwareBreakpointsMemoryBreakpointsBUILDINGAWINDOWSDEBUGGERDebuggee,WhereArtThouObtainingCPURegisterStateThreadEnumerationPuttingItAllTogetherImplementingDebugEventHandlersTheAlmightyBreakpointSoftBreakpointsHardwareBreakpointsMemoryBreakpointsConclusionxContentsinDetailPYDBGAPUREPYTHONWINDOWSDEBUGGERExtendingBreakpointHandlersAccessViolationHandlersProcessSnapshotsObtainingProcessSnapshotsPuttingItAllTogetherIMMUNITYDEBUGGERTHEBESTOFBOTHWORLDSInstallingImmunityDebuggerImmunityDebuggerPyCommandsPyHooksExploitDevelopmentFindingExploitFriendlyInstructionsBadCharacterFilteringBypassingDEPonWindowsDefeatingAntiDebuggingRoutinesinMalwareIsDebuggerPresentDefeatingProcessIterationHOOKINGSoftHookingwithPyDbgHardHookingwithImmunityDebuggerDLLANDCODEINJECTIONRemoteThreadCreationDLLInjectionCodeInjectionGettingEvilFileHidingCodingtheBackdoorCompilingwithpyexeFUZZINGBugClassesBufferOverflowsIntegerOverflowsFormatStringAttacksFileFuzzerFutureConsiderationsCodeCoverageAutomatedStaticAnalysisContentsinDetailxiSULLEYSulleyInstallationSulleyPrimitivesStringsDelimitersStaticandRandomPrimitivesBinaryDataIntegersBlocksandGroupsSlayingWarFTPDwithSulleyFTPCreatingtheFTPProtocolSkeletonSulleySessionsNetworkandProcessMonitoringFuzzingandtheSulleyWebInterfaceFUZZINGWINDOWSDRIVERSDriverCommunicationDriverFuzzingwithImmunityDebuggerDriverlibTheStaticAnalysisToolforDriversDiscoveringDeviceNamesFindingtheIOCTLDispatchRoutineDeterminingSupportedIOCTLCodesBuildingaDriverFuzzerIDAPYTHONSCRIPTINGIDAPROIDAPythonInstallationIDAPythonFunctionsUtilityFunctionsSegmentsFunctionsCrossReferencesDebuggerHooksExampleScriptsFindingDangerousFunctionCrossReferencesFunctionCodeCoverageCalculatingStackSizePYEMUTHESCRIPTABLEEMULATORInstallingPyEmuPyEmuOverviewPyCPUPyMemoryPyEmuxiiContentsinDetailExecutionMemoryandRegisterModifiersHandlersIDAPyEmuFunctionEmulationPEPyEmuExecutablePackersUPXPackerUnpackingUPXwithPEPyEmuINDEXFOREWORDThephrasemostoftenheardatImmunityisprobably,“Isitdoneyet”Commonparlanceusuallygoessomethinglikethis:“I’mstartingworkonthenewELFimporterforImmunityDebugger”Slightpause“Isitdoneyet”or“IjustfoundabuginInternetExplorer!”Andthen,“Istheexploitdoneyet”It’sthisrapidpaceofdevelopment,modification,andcreationthatmakesPythontheperfectchoiceforyournextsecurityproject,beitbuildingaspecialdecompileroranentiredebuggerIfinditdizzyingsometimestowalkintoAceHardwarehereinSouthBeachandwalkdownthehammeraisleTherearearounddifferentkindsondisplay,arrangedinneatrowsinthetinystoreEachonehassomeminorbutextremelyimportantdifferencefromthenextI’mnotenoughofahandymantoknowwhattheidealuseforeachdeviceis,butthesameprincipleholdswhencreatingsecuritytoolsEspeciallywhenworkingonweborcustombuiltapps,eachassessmentisgoingtorequiresomekindofspecialized“hammer”BeingabletothrowtogethersomethingthathookstheSQLAPIhassavedanImmunityteamonmorethanoneoccasionButofcourse,thisdoesn’tjustxivForewordapplytoassessmentsOnceyoucanhooktheSQLAPI,youcaneasilywriteatooltodoanomalydetectionagainstSQLqueries,providingyourorganizationwithaquickfixagainstapersistentattackerEveryoneknowsthatit’sprettyhardtogetyoursecurityresearcherstoworkaspartofateamMostsecurityresearchers,whenfacedwithanysortofproblem,wouldliketofirstrebuildthelibrarytheyaregoingtousetoattacktheproblemLet’ssayit’savulnerabilityinanSSLdaemonofsomekindIt’sverylikelythatyourresearcherisgoingtowanttos

类似资料

该用户的其他资料

[Developer Shed Network] Server Side - Python - Object Oriented Programming with Python (Part 1).bak.pdf

[笨方法学.Python].(Learn.Python.The.Hard.Way).Zed.Shaw.文字版.bak.pdf

Python 2.4 Quick Reference Card - Pointal.bak.pdf

Cambridge.University.Press-Python.for.Software.Design.(2010).bak.pdf

Tkinter 8.4 Reference - A GUI for Python(20101212).pdf

职业精品

精彩专题

上传我的资料

精选资料

热门资料排行换一换

  • 07J306窗井、设备吊装口、排…

  • 中文文献MLA格式说明_(201…

  • 边坡稳定性分析与滑坡防治.pdf

  • 甜品制作与甜品店经营全攻略.pdf

  • [星巴克:一切与咖啡无关].(美…

  • 插花.ppt

  • (无缺页) 船山全书 03 诗经…

  • [倒立].莫言.pdf

  • introducing-phil…

  • 资料评价:

    / 220
    所需积分:0 立即下载

    意见
    反馈

    返回
    顶部