Python Hacking Essentials

5684d6d56acfc.jpg Author Earnest Wish
Isbn 978-1511797566
File size 17.6 Mb
Year 2015
Pages 214
Language English
File format PDF
Category Security

Book Description:

This book is not for professional hackers. Instead, this book is made for beginners who have programming experience and are interested in hacking. Here, hacking techniques that can be easily understood have been described. If you only have a home PC, you can test all the examples provided here. I have included many figures that are intuitively understandable rather than a litany of explanations. Therefore, it is possible to gain some practical experience while hacking, since I have only used examples that can actually be implemented. This book is therefore necessary for ordinary people who have a curiosity of hackers and are interested in computers.
Organization of the Book
This book is made up of five major parts, from basic knowledge to actual hacking code. A beginner is naturally expected to become a hacker while reading this book.

Hacking Preparation
Briefly introduce the basic Python syntax that is necessary for hacking.
Application Hacking
Introduce the basic skills to hack an application, such as Keyboard hooking, API hooking and image file hacking.
Web Hacking
The Virtual Box test environment configuration is used for a Web Shell attack to introduce web hacking, which is currently an important issue. The techniques include SQL Injection, Password Cracking, and a Web Shell Attack.
Network Hacking
A variety of tools and the Python language can be combined to support network hacking and to introduce the network hacking technique. Briefly, we introduce NMap with the Wireshark tool, and hacking techniques such as Port Scanning, Packet Sniffing, TCP SYN Flood, Slowris Attack are introduced.
System Hacking
System hacking is difficult to understand for beginners, and in this section, figures are used to introduce difficult concepts. The hacking techniques that are introduced include a Backdoor, Registry Handling, Stack Based Buffer Overflow, and SEH Based Buffer Overflow.

While reading this book, it is possible to obtain answers for such problems one by one. After reading the last chapter, you will gain the confidence to be a hacker.

 

Download (17.6 Mb)

No Comments

Leave a Reply

Your email address will not be published. Required fields are marked *