When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen?
In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you'll explore the darker side of Python's capabilities—writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, and more. You'll learn how to:
Create a trojan command-and-control using GitHub
Detect sandboxing and automate common malware tasks, like keylogging and screenshotting
Escalate Windows privileges with creative process control
Use offensive memory forensics tricks to retrieve password hashes and inject shellcode into a virtual machine
Extend the popular Burp Suite web-hacking tool
Abuse Windows COM automation to perform a man-in-the-browser attack
Exfiltrate data from a network most sneakily
Insider techniques and creative challenges throughout show you how to extend the hacks and how to write your own exploits.
When it comes to offensive security, your ability to create powerful tools on the fly is indispensable. Learn how in Black Hat Python.
Real-Life X-Files: Investigating the Paranormal "Whoever said that the truth is both stranger and more entertaining than fiction describes this book exactly." -- Skeptical Inquirer
Interest in the paranormal is at an all-time high. Ghosts, UFOs, psychic power and other unexplained phenomena are endlessly fascinating for us. People often seem to accept of...
Rough Sets, Fuzzy Sets, Data Mining and Granular Computing: 13th International Conference, RSFDGrC 2011, Moscow, Russia, June 25-27, 2011, Proceedings (Lecture Notes in Computer Science)
This book constitutes the refereed proceedings of the 13th International Conference on Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing, R.S.F.D.Gr.C. 2011, held in Moscow, Russia in June 2011. The 49 revised full papers presented together with 5 invited and 2 tutorial papers were carefully reviewed and selected from a total of 83... Winning Secrets of Online Poker
Get ready to develop and refine your online poker skills with these winning secrets! Effectively use the various tools at your disposal to examine your play and gain valuable insights about yourself and your opponents. Recognize cheating when it occurs and take action. Examine the decisions you need to make from the first round of cards to...
Beginning XML, 4th Edition (Programmer to Programmer) The perfect resource for beginning XML programmers, this guidebook shows you what XML is, how to use it, and what technologies surround it. The authors build on the strengths of previous editions while covering the latest changes in the XML landscape such as XQuery, RSS and Atom, and Ajax. You will progress from XML basics to more advanced... Tucci and Usmani's The Business of Photography
So you’ve decided to be a photographer. You studied photography in
college or went to art school, and you’ve come to the point of deciding
that it’s time to hang out your shingle. Or maybe you’re self-taught and
everyone loves your work and says, “Hey, you could make...
Object-Oriented ActionScript 3.0 Object-oriented programming (OOP) is something that is usually considered a black art for hardcore programmers, not a topic of conversation for Flash developers. However, when adobe introduced actionscript 3.0 to the mix, it changed everything. actionscript 3.0 is much more powerful than previous versions, allowing Flash developers to produce...