微信扫一扫联系客服

微信扫描二维码

进入报告厅H5

关注报告厅公众号

168

电子书-蟒蛇的黑客技术要点 Python Hacking Essentials (英)

# 计算机 # 互联网和万维网 # 黑客技术 大小:3.74M | 页数:112 | 上架时间:2022-04-05 | 语言:英文

电子书-蟒蛇的黑客技术要点 Python Hacking Essentials (英).pdf

电子书-蟒蛇的黑客技术要点 Python Hacking Essentials (英).pdf

试看10页

类型: 电子书

上传者: 二一

出版日期: 2022-04-05

摘要:

Target Audience

    This book is not for professional hackers. Instead, this book is made for beginners who have programming experience and are interested in hacking. Here, hacking techniques that can be easily understood have been described. If you only have a home PC, you can test all the examples provided here. I have included many figures that are intuitively understandable rather than a litany of explanations. Therefore, it is possible to gain some practical experience while hacking, since I have only used examples that can actually be implemented. This book is therefore necessary for ordinary people who have a curiosity of hackers and are interested in computers.

Organization of the Book

    This book is made up of five major parts, from basic knowledge to actual hacking code. A beginner is naturally expected to become a hacker while reading this book.

    Hacking Preparation
      Briefly introduce the basic Python syntax that is necessary for hacking.
    Application Hacking
      Introduce the basic skills to hack an application, such as Keyboard hooking, API hooking and image file hacking.
    Web Hacking
      The Virtual Box test environment configuration is used for a Web Shell attack to introduce web hacking, which is currently an important issue. The techniques include SQL Injection, Password Cracking, and a Web Shell Attack.
    Network Hacking
      A variety of tools and the Python language can be combined to support network hacking and to introduce the network hacking technique. Briefly, we introduce NMap with the Wireshark tool, and hacking techniques such as Port Scanning, Packet Sniffing, TCP SYN Flood, Slowris Attack are introduced.
    System Hacking
      System hacking is difficult to understand for beginners, and in this section, figures are used to introduce difficult concepts. The hacking techniques that are introduced include a Backdoor, Registry Handling, Stack Based Buffer Overflow, and SEH Based Buffer Overflow.


While reading this book, it is possible to obtain answers for such problems one by one. After reading the last chapter, you will gain the confidence to be a hacker.

Features of this book

    When you start to study hacking, the most difficult task is to configure the test environment. There are many problems that need to be addressed, such as choosing from the variety in operating systems, obtaining expensive equipment and using complex technology. Such problems are too difficult to take in at once, so this book overcomes this difficulty by implementing a simple idea.

    First, systems will be described as Windows-based. We are very familiar with Windows, so it is very easy to understand a description based on Windows. Since Windows, Linux, Unix, and Android are all operating systems, it is possible to expand the concepts that are discussed here.

    Second, we use a virtual machine called Virtual Box. For hacking, it is necessary to connect at least three or more computers on a network. Since it is a significant investment to buy a few computers only to study these techniques, a virtual machine can be used instead to easily implement a honeypot necessary to hack by creating multiple virtual machines on a single PC.

    Finally, abstract concepts are explained using figures. Rather than simply using words for descriptions, graphics are very effective in transferring information. An abstract concept can materialize through the use of graphics in order to improve the understanding on the part of the reader.
    目标受众

      本书不是为专业黑客编写的。相反,这本书是为那些有编程经验并对黑客感兴趣的初学者编写的。在这里,描述了可以轻松理解的黑客技术。如果你只有一台家用电脑,你可以测试这里提供的所有例子。我包括了许多直观易懂的数字,而不是一连串的解释。因此,在黑客攻击时有可能获得一些实际经验,因为我只使用了实际可以实现的例子。因此,这本书对于那些对黑客有好奇心并对计算机感兴趣的普通人来说是很有必要的。
      本书的组织
      本书由五个主要部分组成,从基本知识到实际黑客代码。初学者在阅读本书时,自然有望成为一名黑客。

      黑客准备
      简要介绍黑客攻击所需的基本Python语法。
      应用程序黑客攻击
      介绍黑掉一个应用程序的基本技能,如键盘挂接、API挂接和图像文件挂接。
      网络黑客攻击
      利用Virtual Box测试环境配置进行Web Shell攻击,介绍网络黑客攻击,这是目前一个重要问题。这些技术包括SQL注入,密码破解,和一个Web Shell攻击。
      网络黑客攻击
      各种工具和Python语言可以结合起来,以支持网络黑客攻击,并介绍网络黑客攻击技术。简单地说,我们用Wireshark工具介绍NMap,并介绍了端口扫描、数据包嗅探、TCP SYN Flood、Slowris攻击等黑客技术。
      系统黑客攻击
      系统黑客攻击对初学者来说是很难理解的,在这一节中,用数字来介绍困难的概念。所介绍的黑客技术包括后门、注册表处理、基于堆栈的缓冲区溢出和基于SEH的缓冲区溢出。

      在阅读本书时,有可能逐一获得此类问题的答案。读完最后一章后,你将获得成为黑客的信心。

      本书的特点
      当你开始学习黑客技术时,最困难的任务是配置测试环境。有许多问题需要解决,如从各种操作系统中选择,获得昂贵的设备和使用复杂的技术。这样的问题一下子接受起来太难了,所以本书通过实施一个简单的想法来克服这个困难。

      首先,系统将被描述为基于Windows。我们对Windows非常熟悉,所以基于Windows的描述非常容易理解。由于Windows、Linux、Unix和Android都是操作系统,所以可以扩展这里讨论的概念。

      第二,我们使用一个叫做Virtual Box的虚拟机。对于黑客攻击,有必要在网络上连接至少三台以上的计算机。由于仅仅为了研究这些技术而购买几台电脑是一项重大的投资,因此可以用虚拟机来代替,通过在一台电脑上创建多个虚拟机来轻松实现黑客所需的蜜罐。

      最后,用数字来解释抽象的概念。与其简单地使用文字进行描述,图形在传递信息方面非常有效。一个抽象的概念可以通过使用图形来具体化,以提高读者的理解。
展开>> 收起<<

请登录,再发表你的看法

登录/注册

二一

相关文库

更多

浏览量

(126)

下载

(2)

收藏

分享

购买

5积分

0积分

原价5积分

VIP

*

投诉主题:

  • 下载 下架函

*

描述:

*

图片:

上传图片

上传图片

最多上传2张图片

提示

取消 确定

提示

取消 确定

提示

取消 确定

积分充值

选择充值金额:

30积分

6.00元

90积分

18.00元

150+8积分

30.00元

340+20积分

68.00元

640+50积分

128.00元

990+70积分

198.00元

1640+140积分

328.00元

微信支付

余额支付

积分充值

填写信息

姓名*

邮箱*

姓名*

邮箱*

注:填写完信息后,该报告便可下载

选择下载内容

全选

取消全选

已选 1