My study notes---python grey hat
The world makes me black and blue, but the wound is wings.--------------------------------------------ObjectiveThis book is written by Mr. Lead author, senior Black Hat Justinseitz, a well-known security Agency IMMUNITYINC, about how programming language
Gray Hat python python programming for hackers and reverse engineersPython grey hat: The path of Python programming for hackers and reverse project architectsAlmost the same two weeks ago to see the book, the mood is very excited
network dataPackage, we set the protection page on the memory of the storage packet, then run the program, and once there is any access to the protection pageask, will cause the CPU to pause, throw a Protection page debugging exception , this time we can determine when the program isIn what way to access the received data. Then further follow the instructions to observe the memory access, and then determine the programWhat the data does. This breakpoint also solves the problem of software break
),("Hstdoutput", HANDLE),("Hstderror", HANDLE),]Class Process_information (Structure):_fields_ = [("hprocess", HANDLE),("Hthread", HANDLE),("Dwprocessid", DWORD),("dwThreadID", DWORD),]# my_debugger.pyFrom ctypes Import *From my_debugger_defines Import *KERNEL32 = Windll.kernel32Class Debugger ():def __init__ (self):Passdef load (Self,path_to_exe):# Dwcreation flag determines how to create the process# set creation_flags = Create_new_console if you want# to see the calculator GUICreation_flags =
General idea:Os.path.abspath ('. ') #获取当前路径Os.listdir #获取指定的文件夹包含的文件或文件夹的名字的列表Os.path.join #用获取的文件名拼接路径Os.path.isdir #判断路径是否为目录, for recursion1 #-*-coding:utf-8-*-2 3 __author__='Dou-wei'4 5 ImportOS6 ImportSYS7 8file_name = sys.argv[1]#get the user's terminal input to name the file9Start_path = Os.path.abspath ('.')#Get current pathTenHost = Os.path.join (Start_path,file_name)#Stitching Path Onef = open (host,'W')#Create a writable file in a stitched path A - defSearch (path): - forXinchO
Gray Hat python python programming for hackers and reverse engineersPython grey hat: The path of Python programming for hackers and reverse engineersAlmost two weeks ago to see the book, the mood is very excited ah, determined to
,input_dim=2)) Model.add (Activation (' Relu ')) Add elements of the model in turn
dense layer (fully connected layer): mainly defines the main structure of input, output and hidden layer of the model.
Dense (12,input_dim=2) is a hidden layer of 12 nodes, the input layer is 2 nodes, and the input layer must be the second parameter.
activation function (Activation): can be self-contained in the Keras library, or it can be customized
objective function (loss function):
Python Black Hat programming 1.1 virtual machine installation and configuration Kali Linux 2016PythonBlack Hat Programming 1.1 virtual machine installation and configuration Kali Linux 20160.1 Tutorial instructions in this seriesThis series of tutorials, the use of the outline of the parent for the "Understanding Network Hacks Attack and Defense with
VLAN (VirtualLocalAreaNetwork) is a virtual network built based on Ethernet interaction technology. it can divide a physical network into multiple valns or overcome physical network barriers, users in different subnets are allocated to the same VLAN. This article mainly introduces Python black hat programming 3.4 Cross-VLAN information. For more information, see Virtual Local Area Network (VLAN). It is a Vi
Python has a number of well-established libraries, including penetration testing tools, so the vast majority of white hat hackers use the Python language, which is more conducive to the use of Python provided by these libraries to participate in vulnerability research, reverse engineering and infiltration work.This art
1 Official website Download python-3.5.2.tgz2 upload to Redhat system specified directory, unzip with tar zxvf python-3.5.2.tgz command3 Go to Unzip after directory execution:1)./configure2) make [if the making process discovers that the encoding is not recognized can be performed (export LANG=ZH_CN. UTF-8 and Export LANGUAGE=ZH_CN. UTF-8)]3) make install4 If the native system already has
parsing.The last three lines of code are specific applications where we use pcapy for data capture.pcap = pcapy.open_live(dev, 1500, 0, 100)Open_live method The first parameter is the device to be opened, the second parameter is the size of the capture packet, whether the third parameter turns on promiscuous mode, the fourth parameter is the delay time to wait for the packet, and the method returns a Pcapy object.pcap.setfilter(filter)Call the SetFilter method to set the filter.pcap.loop(0, han
to%s/r/n "% upload_destination)
Exception occurred in
data = CLIENT_SOCKET.RECV ()
Statement, the SOCKET.RECV () function produces an exception, error [Errno 10054], when the client actively forces a disconnect (CTRL + C under Windows terminal) when debugging. And the data here will not be empty, socket whether blocking or non-blocking, the return value of SOCKET.RECV () will not be null characters, so use if not data: As a jump out of the loop is not appropriate.
D:\myProjects\Black-
Python Black Hat programming 3.4
A Virtual Local Area Network (VLAN) is a Virtual Network built based on the Ethernet interaction technology. It can divide a physical Network into multiple valns or overcome physical Network barriers, users in different subnets are allocated to the same VLAN. Figure 2 shows an example of VLAN division.
Figure 2
There are many ways to implement VLANs. VLAN division based on
Learn Python recently and summarize how to add a shell script to reach (object.) tab, press 2 to reduce the appearance of all methods.1, first in the directory:/usr/lib64/python2.7/site-packages below the creation of vim tab.py file.2. The following contents of the tab.py file:#!/usr/bin/pythonimport osimport readlineimport rlcompleterimport atexitimport os# tab completionreadline.parse_and_ Bind (' Tab:complete ') # History filehistfile = Os.path.joi
implement ARP spoofing across VLANs.
3.4.3 Summary
This section focuses on how to construct packets that spoof VLANs to achieve the purpose of cross-VLAN data communication and ARP spoofing. It is important to note that the method in this article is primarily for the 802.1Q protocol, and there is no effect on VLANs that are physically isolated on ports.
The above is a small series to introduce you to the Python Black
spoofing across VLANs.
Summary of 3.4.3
This section mainly discusses how to construct spoofed VLAN packets to achieve the purpose of cross VLAN data communication and ARP spoofing. It is important to note that the approach in this article is primarily for the 802.1Q protocol, which has no effect on the VLAN that is physically isolated from the port.
The above is a small set to introduce Python black hat
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.