没有合适的资源?快使用搜索试试~ 我知道了~
Python System Hacking Essentials 无水印pdf
需积分: 10 6 下载量 20 浏览量
2017-10-04
10:16:29
上传
评论
收藏 2.14MB PDF 举报
温馨提示
试读
92页
Python System Hacking Essentials 英文无水印pdf pdf所有页面使用FoxitReader和PDF-XChangeViewer测试都可以打开 本资源转载自网络,如有侵权,请联系上传者或csdn删除 本资源转载自网络,如有侵权,请联系上传者或csdn删除
资源推荐
资源详情
资源评论
Python System Hacking
Essentials
Earnest Wish, Leo
Copyright © 2015 Earnest Wish, Leo
All rights reserved.
ISBN: 1511797568
ISBN-13: 978-1511797566
ABOUT THE AUTHORS
Earnest Wish
Earnest Wish has 15 years of experience as an information security
professional and a white hacker. He developed the internet stock
trading system at Samsung SDS at the beginning of his IT career,
and he gained an extensive amount experience in hacking and
security while operating the Internet portal system at KTH (Korea
Telecom Hitel). He is currently responsible for privacy and
information security work in public institutions and has deep
knowledge with respect to vulnerability assessments, programming
and penetration testing. He obtained the Comptia Network +
Certification and the license of Professional Engineer for Computer
System Applications. This license is provided by the Republic of
Korea to leading IT Professionals.
Leo
Leo is a computer architect and a parallel processing expert. He is
the author of six programming books. As a junior programmer, he
developed a billing system and a hacking tool prevention system in
China. In recent years, he has studied security vulnerability analysis
and the improvement in measures for parallel programming. Now,
he is a lead optimization engineer to improve CPU and GPU
performance.
CONTENTS IN DETAIL
Chapter 1 Preparation for Hacking 1
1.1 Starting Python 1
1.2. Basic Grammar 3
1.3 Functions 8
1.4 Class and Object 11
1.5 Exception Handling 14
1.6 Module 17
1.7 File Handling 21
1.8 String Format 25
Chapter 2 System Hacking 28
2.1 System Hacking Overview 28
2.2 Backdoor 30
2.3 Registry 42
2.4 Buffer Overflow 51
2.5 Stack-Based Buffer Overflow 54
2.6 SEH Based Buffer Overflow 67
Chapter 3 Conclusion 83
PREFACE
Target Audience
This book is not for professional hackers. Instead, this book is
made for beginners who have programming experience and are
interested in hacking. Here, hacking techniques that can be
easily understood have been described. If you only have a
home PC, you can test all the examples provided here. I have
included many figures that are intuitively understandable rather than
a litany of explanations. Therefore, it is possible to gain some
practical experience while hacking, since I have only used examples
that can actually be implemented. This book is therefore necessary
for ordinary people who have a curiosity of hackers and are
interested in computers.
Organization of the Book
This book is made up of five major parts, from basic knowledge to
actual hacking code. A beginner is naturally expected to become a
hacker while reading this book.
• Hacking Preparation
Briefly introduce the basic Python syntax that is necessary for
hacking.
• System Hacking
System hacking is difficult to understand for beginners, and in this
section, figures are used to introduce difficult concepts. The
hacking techniques that are introduced include a Backdoor,
Registry Handling, Stack Based Buffer Overflow, and SEH Based
剩余91页未读,继续阅读
资源评论
yinkaisheng-nj
- 粉丝: 763
- 资源: 6953
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
- 一个基本的Python脚本,它模拟了一个简单的网络扫描工具,用于检查本地网络中的活动设备
- 实验4-报告.docx
- 软件测试面试题.pdf
- tomcat概述.pdf
- 基于esp8266和stm32的ov2640网络摄像头
- 2023-04-06-项目笔记 - 第一百零六阶段 - 4.4.2.104全局变量的作用域-104 -2024.04.17
- 2023-04-06-项目笔记 - 第一百零六阶段 - 4.4.2.104全局变量的作用域-104 -2024.04.17
- ACM+比赛经验分享+组队原则+读选题注意项+代码注意项+多讨论
- unity csvHelper
- 2cd4bb63-6460-4deb-ae46-64e78af67d53.xls
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功