Book Description
Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it’s easy to write quickly, and it has the low-level support and libraries that make hackers happy. But until now, there has been no real manual on how to use Python for a variety of hacking tasks. You had to dig through forum posts and man pages, endlessly tweaking your own code to get everything working. Not anymore.
Gray Hat Python explains the concepts behind hacking tools and techniques like debuggers, trojans, fuzzers, and emulators. But author Justin Seitz goes beyond theory, showing you how to harness existing Python-based security tools – and how to build your own when the pre-built ones won’t cut it.
You’ll learn how to:
- Automate tedious reversing and security tasks
- Design and program your own debugger
- Learn how to fuzz Windows drivers and create powerful fuzzers from scratch
- Have fun with code and library injection, soft and hard hooking techniques, and other software trickery
- Sniff secure traffic out of an encrypted web browser session
- Use PyDBG, Immunity Debugger, Sulley, IDAPython, PyEMU, and more
The world’s best hackers are using Python to do their handiwork. Shouldn’t you?
Table of Contents
Chapter 1: Setting Up Your Development Environment
Chapter 2: Debuggers and Debugger Design
Chapter 3: Building a Windows Debugger
Chapter 4: PyDbg — A Pure Python Windows Debugger
Chapter 5: Immunity Debugger — The Best of Both Worlds
Chapter 6: Hooking
Chapter 7: DLL and Code Injection
Chapter 8: Fuzzing
Chapter 9: Sulley
Chapter 10: Fuzzing Windows Drivers
Chapter 11: IDAPython — Scripting IDA Pro
Chapter 12: PyEmu — The Scriptable Emulator
中文:
书名:Gray Hat Python:面向黑客和逆向工程师的Python编程
Python正在迅速成为黑客、逆向工程师和软件测试人员的首选编程语言,因为它很容易快速编写,而且它拥有让黑客满意的低级别支持和库。但到目前为止,还没有真正的手册来说明如何使用Python来执行各种黑客任务。您必须仔细阅读论坛帖子和手册页,无休止地调整您自己的代码才能使一切正常运行。现在不是了。
Gray Hat Python 解释黑客工具和技术(如调试器、特洛伊木马、模糊器和仿真器)背后的概念。但作者贾斯汀·塞茨超越了理论,向你展示了如何利用现有的基于Python的安全工具,以及如何在预置的工具无法满足要求的情况下构建自己的工具。
您将学习如何:
- 自动执行繁琐的倒车和安全任务
- Design and program your own debugger
- 了解如何对Windows驱动程序进行模糊处理并从头开始创建强大的模糊处理程序
- 享受代码和库注入、软挂钩和硬挂钩技术以及其他软件技巧
- 从加密的Web浏览器会话中嗅探安全流量
- 使用PyDBG、免疫调试器、Sulley、IDAPython、PyEMU等
世界上最好的黑客正在使用Python来完成他们的手工工作。你不应该这样做吗?
Table of Contents
Chapter 1: Setting Up Your Development Environment
第2章:调试器和调试器设计
第3章:构建Windows调试器
第4章:纯Python Windows调试器
第5章:免疫调试器—;两全其美
第6章:勾引
第7章:DLL和代码注入
第八章:模糊
Chapter 9: Sulley
第10章:模糊Windows驱动程序
第11章:IDAPython—;编写IDA Pro脚本
第12章:PyEmu—;脚本化仿真器
评论前必须登录!
注册