Gray Hat Python

Gray Hat Python pdf epub mobi txt 電子書 下載2025

Justin Seitz is a Senior Security Researcher for Immunity, Inc., where he spends a great deal of time bughunting, reverse engineering, and doing Python development and malware analysis.

出版者:No Starch Press
作者:Justin Seitz
出品人:
頁數:232
译者:
出版時間:2009-4-23
價格:USD 39.95
裝幀:Paperback
isbn號碼:9781593271923
叢書系列:
圖書標籤:
  • python 
  • 安全 
  • Programming 
  • Security 
  • hacker 
  • Python 
  • 程序設計 
  • 逆嚮工程 
  •  
想要找書就要到 小哈圖書下載中心
立刻按 ctrl+D收藏本頁
你會得到大驚喜!!

Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write quickly, and it has the low-level support and libraries that make hackers happy. But until now, there has been no real manual on how to use Python for a variety of hacking tasks. You had to dig through forum posts and man pages, endlessly tweaking your own code to get everything working. Not anymore. "Gray Hat Python" explains the concepts behind hacking tools and techniques like debuggers, trojans, fuzzers, and emulators. But author Justin Seitz goes beyond theory, showing you how to harness existing Python-based security tools - and how to build your own when the pre-built ones won't cut it. You'll learn how to: Automate tedious reversing and security tasks Design and program your own debugger Learn how to fuzz Windows drivers and create powerful fuzzers from scratch Have fun with code and library injection, soft and hard hooking techniques, and other software trickery Sniff secure traffic out of an encrypted web browser session Use PyDBG, Immunity Debugger, Sulley, IDAPython, PyEMU, and more The world's best hackers are using Python to do their handiwork. Shouldn't you?

具體描述

讀後感

評分

书刚看到第三章, 写的还是不错, 像我这种水平比较差的, 觉得讲的深浅合适, 比看深入理解计算机系统之类的书要好看的多(看那本我总是要睡着....) 但翻译的水平还是比较一般的, 不光是代码的缩进没有整理, 而且很明显代码没有自己敲进电脑里看看. 第三章开篇的CreateProcessA这...  

評分

from ctypes import * kernel = windll.kernel32 advapi = windll.advapi32 HANDLE = c_void_p TOKEN_ADJUST_PRIVILEGES = 0x0020 h_token = HANDLE() if advapi.OpenProcessToken(kernel.GetCurrentProcess(), TOKEN_ADJUST_PRIVILEGES , byref(h_token)): print("OK"...  

評分

这个安全技术大系的书总是书名眼前一亮,翻看眼前一黑。 这个大系的书都感觉一般,原来买过另外的一本,比较失望,这本也有相似的问题,写的太简略,编校也比较粗糙,这本书的方向很吸引我,但在书店翻看了半个小时,还是放下了。 这本书更像一个向导,是那种进入一个世界需...  

評分

其实基本上就是ctype加各种废话 (为了满足字数要求) 其实基本上就是ctype加各种废话 其实基本上就是ctype加各种废话 其实基本上就是ctype加各种废话 其实基本上就是ctype加各种废话 其实基本上就是ctype加各种废话 其实基本上就是ctype加各种废话 其实基本上就是ctype加各种...  

評分

from ctypes import * kernel = windll.kernel32 advapi = windll.advapi32 HANDLE = c_void_p TOKEN_ADJUST_PRIVILEGES = 0x0020 h_token = HANDLE() if advapi.OpenProcessToken(kernel.GetCurrentProcess(), TOKEN_ADJUST_PRIVILEGES , byref(h_token)): print("OK"...  

用戶評價

评分

相當不錯的書,翻譯的其實挺好 挺順的,翻譯到這程度,已經在國內的翻譯書來說,算是相當好的。而那一點點的小錯誤 我覺得是不可避免的,根本不影響閱讀,瑕不掩玉而且譯者或者編者也對一些譯者注的地方也挺細心的。本書能夠把不熟悉自動化逆嚮的人帶進門,並且讓大傢對調試器有直觀的認識

评分

非常不錯,可以自己的實踐少瞭些

评分

你必須對py和C都已經很熟悉,至少已經能幫作者除錯纔能看這個,靠這個熟悉py肯定是沒戲。

评分

整本書,就是走馬觀花

评分

你必須對py和C都已經很熟悉,至少已經能幫作者除錯纔能看這個,靠這個熟悉py肯定是沒戲。

本站所有內容均為互聯網搜索引擎提供的公開搜索信息,本站不存儲任何數據與內容,任何內容與數據均與本站無關,如有需要請聯繫相關搜索引擎包括但不限於百度google,bing,sogou

© 2025 qciss.net All Rights Reserved. 小哈圖書下載中心 版权所有