Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Python Hacking Essentials

Buy

Target Audience

  • This book is not for professional hackers. Instead, this book is made for beginners who have programming experience and are interested in hacking. Here, hacking techniques that can be easily understood have been described. If you only have a home PC, you can test all the examples provided here. I have included many figures that are intuitively understandable rather than a litany of explanations. Therefore, it is possible to gain some practical experience while hacking, since I have only used examples that can actually be implemented. This book is therefore necessary for ordinary people who have a curiosity of hackers and are interested in computers.

Organization of the Book

  • This book is made up of five major parts, from basic knowledge to actual hacking code. A beginner is naturally expected to become a hacker while reading this book.

    Hacking Preparation
    • Briefly introduce the basic Python syntax that is necessary for hacking.
    Application Hacking
    • Introduce the basic skills to hack an application, such as Keyboard hooking, API hooking and image file hacking.
    Web Hacking
    • The Virtual Box test environment configuration is used for a Web Shell attack to introduce web hacking, which is currently an important issue. The techniques include SQL Injection, Password Cracking, and a Web Shell Attack.
    Network Hacking
    • A variety of tools and the Python language can be combined to support network hacking and to introduce the network hacking technique. Briefly, we introduce NMap with the Wireshark tool, and hacking techniques such as Port Scanning, Packet Sniffing, TCP SYN Flood, Slowris Attack are introduced.
    System Hacking
    • System hacking is difficult to understand for beginners, and in this section, figures are used to introduce difficult concepts. The hacking techniques that are introduced include a Backdoor, Registry Handling, Stack Based Buffer Overflow, and SEH Based Buffer Overflow.

While reading this book, it is possible to obtain answers for such problems one by one. After reading the last chapter, you will gain the confidence to be a hacker.
 

Features of this book

  • When you start to study hacking, the most difficult task is to configure the test environment. There are many problems that need to be addressed, such as choosing from the variety in operating systems, obtaining expensive equipment and using complex technology. Such problems are too difficult to take in at once, so this book overcomes this difficulty by implementing a simple idea.

    First, systems will be described as Windows-based. We are very familiar with Windows, so it is very easy to understand a description based on Windows. Since Windows, Linux, Unix, and Android are all operating systems, it is possible to expand the concepts that are discussed here.

    Second, we use a virtual machine called Virtual Box. For hacking, it is necessary to connect at least three or more computers on a network. Since it is a significant investment to buy a few computers only to study these techniques, a virtual machine can be used instead to easily implement a honeypot necessary to hack by creating multiple virtual machines on a single PC.

    Finally, abstract concepts are explained using figures. Rather than simply using words for descriptions, graphics are very effective in transferring information. An abstract concept can materialize through the use of graphics in order to improve the understanding on the part of the reader.
(HTML tags aren't allowed.)

Python Algorithms: Mastering Basic Algorithms in the Python Language
Python Algorithms: Mastering Basic Algorithms in the Python Language

Python Algorithms explains the Python approach to algorithm analysis and design. Written by Magnus Lie Hetland, author of Beginning Python, this book is sharply focused on classical algorithms, but it also gives a solid understanding of fundamental algorithmic problem-solving...

Foundations of Python Network Programming: The comprehensive guide to building network applications with Python
Foundations of Python Network Programming: The comprehensive guide to building network applications with Python

This second edition of Foundations of Python Network Programming targets Python 2.5 through Python 2.7, the most popular production versions of the language. Python has made great strides since Apress released the first edition of this book back in the days of Python 2.3. The advances required new chapters to be written from the ground up,...

E-Librarian Service: User-Friendly Semantic Search in Digital Libraries (X.media.publishing)
E-Librarian Service: User-Friendly Semantic Search in Digital Libraries (X.media.publishing)

The key to understanding the breathtaking development of mankind lies in the ability to objectify knowledge. Just like human knowledge has undergone changes, so have the libraries in their role as treasure chambers of said knowledge. With the advent of the digital age, traditional libraries were complemented by huge collections of digital...


Python 2.6 Text Processing Beginners Guide
Python 2.6 Text Processing Beginners Guide

The Python Text Processing Beginner's Guide is intended to provide a gentle, hands-on introduction to processing, understanding, and generating textual data using the Python programming language. Care is taken to ensure the content is example-driven, while still providing enough background information to allow for a solid...

Artificial Intelligence: Structures and Strategies for Complex Problem Solving (6th Edition)
Artificial Intelligence: Structures and Strategies for Complex Problem Solving (6th Edition)

was very pleased to be asked to produce the sixth edition of my artificial intelligence book. It is a compliment to the earlier editions, started over twenty years ago, that our approach to AI has been so highly valued. It is also exciting that, as new development in the field emerges, we are able to present much of it in each new...

Cloud Computing: Web-Based Dynamic IT Services
Cloud Computing: Web-Based Dynamic IT Services

Cloud computing is on everyone’s lips: as an innovative technology, as the next generation of the Internet, as a fundamental transformation of the entire IT landscape, and as an auspicious opportunity to introduce new business ideas. But what is actually at the heart of this notion?

As a result of the multi-faceted...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy