Gray Hat Python Python Programming for Hackers and Reverse Engineers

ISBN-10: 1593271921
ISBN-13: 9781593271923
Edition: 2009
Authors: Justin Seitz
List price: $39.95 Buy it from $16.16 Rent it from $17.25
30 day, 100% satisfaction guarantee

If an item you ordered from TextbookRush does not meet your expectations due to an error on our part, simply fill out a return request and then return it by mail within 30 days of ordering it for a full refund of item cost.

Learn more about our returns policy

Description: Python is the high-level language of choice for hacking, vulnerability discovery, and security research. Gray Hat Python, the first Python book written for advanced security analysts, explains the intricacies of using Python to assist in a range of  More...

Used Starting from $16.16
New Starting from $30.02
Rent Starting from $17.25
what's this?
Rush Rewards U
Members Receive:
coins
coins
You have reached 400 XP and carrot coins. That is the daily max!
You could win $10,000

Get an entry for every item you buy, rent, or sell.

Study Briefs

Limited time offer: Get the first one free! (?)

All the information you need in one place! Each Study Brief is a summary of one specific subject; facts, figures, and explanations to help you learn faster.

Add to cart
Study Briefs
Periodic Table Online content $4.95 $1.99
Add to cart
Study Briefs
SQL Online content $4.95 $1.99
Add to cart
Study Briefs
MS Excel® 2010 Online content $4.95 $1.99
Add to cart
Study Briefs
MS Word® 2010 Online content $4.95 $1.99

Customers also bought

Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading

Book details

List price: $39.95
Copyright year: 2009
Publisher: No Starch Press, Incorporated
Publication date: 5/3/2009
Binding: Paperback
Pages: 216
Size: 7.00" wide x 9.00" long x 0.50" tall
Weight: 1.012
Language: English

Python is the high-level language of choice for hacking, vulnerability discovery, and security research. Gray Hat Python, the first Python book written for advanced security analysts, explains the intricacies of using Python to assist in a range of security analysis tasks. Readers learn how to design and program their own debuggers, create powerful fuzzers, utilize open source libraries to automate tedious tasks, and interface with commercial and non-commercial security tools. Gray Hat Python covers everything from the nuts and bolts of how to use the language for basic code and DLL injection to using Python to analyze binaries and disassemble software. It also discusses a variety of open source Python tools (such as PyDbg, PaiMei, PyEmu, Sulley, and Immunity Debugger) and how to extend them. Fundamentally a security book, Gray Hat Python reveals just how superior the Python language is when it comes to hacking, reverse engineering, malware analysis and software testing.

Matthew Gast is the director of product management at Aerohive Networks, responsible for the software that powers Aerohive's networking devices. He has been active within the Wi-Fi community, serving as the chair of both security task groups at the Wi-Fi Alliance, where he leads efforts to extend the Wi-Fi Protected Access (WPA) certification to incorporate newly developed security technologies and drive adoption of the strongest forms of security by network administrators. He also led the Wi-Fi Alliance's Wireless Network Management marketing task group's investigation of certification requirements for new power-saving technologies. Matthew is also the past chair of the task group that produced the 802.11-2012 revision.Justin Seitz is a Senior Security Researcher for Immunity, Inc., where he spends his time bug hunting, reverse engineering, writing exploits, and coding Python. He is the author of Gray Hat Python, the first book to cover the use of Python for security analysis.

Foreword
Acknowledgments
Introduction
Setting up Your Development Environment
Operating System Requirements
Obtaining and Installing Python 2.5
Installing Python on Windows
Installing Python for Linux
Setting Up Eclipse and PyDev
The Hacker's Best Friend: ctypes
Using Dynamic Libraries
Constructing C Datatypes
Passing Parameters by Reference
Defining Structures and Unions
Debuggers and Debugger Design
General-Purpose CPU Registers
The Stack
Debug Events
Breakpoints
Soft Breakpoints
Hardware Breakpoints
Memory Breakpoints
Building A Windows Debugger
Debuggee, Where Art Thou?
Obtaining CPU Register State
Thread Enumeration
Putting It All Together
Implementing Debug Event Handlers
The Almighty Breakpoint
Soft Breakpoints
Hardware Breakpoints
Memory Breakpoints
Conclusion
Pydbg-A Pure Python Windows Debugger
Extending Breakpoint Handlers
Access Violation Handlers
Process Snapshots
Obtaining Process Snapshots
Putting It All Together
Immunity Debugger-The Best Of Both Worlds
Installing Immunity Debugger
Immunity Debugger 101
PyCommands
PyHooks
Exploit Development
Finding Exploit-Friendly Instructions
Bad-Character Filtering
Bypassing DEP on Windows
Defeating Anti-Debugging Routines in Malware
IsDebuggerPresent
Defeating Process Iteration
Hooking
Soft Hooking with PyDbg
Hard Hooking with Immunity Debugger
DLL and Code Injection
Remote Thread Creation
DLL Injection
Code Injection
Getting Evil
File Hiding
Coding the Backdoor
Compiling with py2exe
Fuzzing
Bug Classes
Buffer Overflows
Integer Overflows
Format String Attacks
File Fuzzer
Future Considerations
Code Coverage
Automated Static Analysis
Sulley
Sulley Installation
Sulley Primitives
Strings
Delimiters
Static and Random Primitives
Binary Data
Integers
Blocks and Groups
Slaying WarFTPD with Sulley
FTP 101
Creating the FTP Protocol Skeleton
Sulley Sessions
Network and Process Monitoring
Fuzzing and the Sulley Web Interface
Fuzzing Windows Drivers
Driver Communication
Driver Fuzzing with Immunity Debugger
Driverlib-The Static Analysis Tool for Drivers
Discovering Device Names
Finding the IOCTL Dispatch Routine
Determining Supported IOCTL Codes
Building a Driver Fuzzer
Idapython-Scripting Ida Pro
IDAPython Installation
IDAPython Functions
Utility Functions
Segments
Functions
Cross-References
Debugger Hooks
Example Scripts
Finding Dangerous Function Cross-References
Function Code Coverage
Calculating Stack Size
Pyemu-The Scriptable Emulator
Installing PyEmu
PyEmu Overview
PyCPU
PyMemory
PyEmu
Execution
Memory and Register Modifiers
Handlers
IDAPyEmu
Function Emulation
PEPyEmu
Executable Packers
UPX Packer
Unpacking UPX with PEPyEmu
Index

×
Free shipping on orders over $35*

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

Learn more about the TextbookRush Marketplace.

×