Python Hacking Essentials
Autor Earnest Wishen Limba Engleză Paperback
"Hacking Preparation" Briefly introduce the basic Python syntax that is necessary for hacking. "Application Hacking" Introduce the basic skills to hack an application, such as Keyboard hooking, API hooking and image file hacking. "Web Hacking" The Virtual Box test environment configuration is used for a Web Shell attack to introduce web hacking, which is currently an important issue. The techniques include SQL Injection, Password Cracking, and a Web Shell Attack. "Network Hacking" A variety of tools and the Python language can be combined to support network hacking and to introduce the network hacking technique. Briefly, we introduce NMap with the Wireshark tool, and hacking techniques such as Port Scanning, Packet Sniffing, TCP SYN Flood, Slowris Attack are introduced. "System Hacking" System hacking is difficult to understand for beginners, and in this section, figures are used to introduce difficult concepts. The hacking techniques that are introduced include a Backdoor, Registry Handling, Stack Based Buffer Overflow, and SEH Based Buffer Overflow.
While reading this book, it is possible to obtain answers for such problems one by one. After reading the last chapter, you will gain the confidence to be a hacker.
Features of this book When you start to study hacking, the most difficult task is to configure the test environment. There are many problems that need to be addressed, such as choosing from the variety in operating systems, obtaining expensive equipment and using complex technology. Such problems are too difficult to take in at once, so this book overcomes this difficulty by implementing a simple idea.
First, systems will be described as Windows-based. We are very familiar with Windows, so it is very easy to understand a description based on Windows. Since Windows, Linux, Unix, and Android are all operating systems, it is possible to expand the concepts that are discussed here.
Second, we use a virtual machine called Virtual Box. For hacking, it is necessary to connect at least three or more computers on a network. Since it is a significant investment to buy a few computers only to study these techniques, a virtual machine can be used instead to easily implement a honeypot necessary to hack by creating multiple virtual machines on a single PC.
Finally, abstract concepts are explained using figures. Rather than simply using words for descriptions, graphics are very effective in transferring information. An abstract concept can materialize through the use of graphics in order to improve the understanding on the part of the reader.
Preț: 105.20 lei
Preț vechi: 131.50 lei
-20% Nou
Puncte Express: 158
Preț estimativ în valută:
20.13€ • 20.91$ • 16.72£
20.13€ • 20.91$ • 16.72£
Carte disponibilă
Livrare economică 13-27 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781511797566
ISBN-10: 1511797568
Pagini: 214
Dimensiuni: 152 x 229 x 11 mm
Greutate: 0.29 kg
Editura: CreateSpace Independent Publishing Platform
ISBN-10: 1511797568
Pagini: 214
Dimensiuni: 152 x 229 x 11 mm
Greutate: 0.29 kg
Editura: CreateSpace Independent Publishing Platform