Python For Hackers
Python For Hackers
About the Book
Learn the secrets of hackers with practical examples
How to brute force a password using a dictionary
How to predict user sessions and steal data from other users
Directory Transversal: How to steal the passwords file
XSS attack : How to steal the user’s cookie
SQL injection: Destroy user data with a well crafted SQL query!
Stack overflow: Force the system to log you in, even with the wrong password
A simulation of the Heartbleed bug: Read hidden & secret data
Heap overflow: Read a secret file you are banned from reading, by overflowing the internal memory buffers
and more:
How to prevent all the attacks above
General principles on writing secure code
How to store passwords safely
How code is compiled, how we go from high level to assembly to machine language.
You will be provided a virtual machine with all the code, so you can start practicing immediately.
Ready to start hacking?
Table of Contents
-
- 1. Introduction
-
I Part 1
-
2. Setting Up Your System
- 2.1 Starting the virtual machine
- 2.2 Selenium and Pydriver
-
3. Brute Force Dictionary Attack
- 3.1 Preventing brute force attacks
-
4. Session Prediction Attack
- 4.1 Preventing Session prediction
-
5. Directory Transversal attack
- 5.1 Preventing directory transversal
-
6. Cross Site Scripting
- 6.1 Stealing the user cookie
- 6.2 Preventing XSS attacks
- 7. SQL Code Injection
-
8. Principles of Secure Coding
- 8.1 Never trust user input
- 8.2 Don’t roll your own solution
- 8.3 Don’t do security by obscurity
- 8.4 Follow good software engineering practices
- 8.5 Keep the design simple
- 8.6 Each component must have its own security
- 8.7 Default deny
- 8.8 Update all your software regularly
- 8.9 Finally, if you can afford it, have an external security audit
-
9. Storing Passwords safely
- 9.1 Rainbow attacks, or the problem with just encrypting
- 9.2 Salting
-
2. Setting Up Your System
-
II Part 2
-
10. From C to assembly to machine code
- 10.1 A 5 minute guide to C
- 10.2 The compilation process
- 11. Stack Overflow
- 12. A simulation of the Heartbleed bug
- 13. Heap Overflow
-
14. Preventing Overflow attacks
- 14.1 Practical ways to stop stack/heap based attacks
- 15. Conclusion
-
10. From C to assembly to machine code
Other books by this author
The Leanpub 60 Day 100% Happiness Guarantee
Within 60 days of purchase you can get a 100% refund on any Leanpub purchase, in two clicks.
Now, this is technically risky for us, since you'll have the book or course files either way. But we're so confident in our products and services, and in our authors and readers, that we're happy to offer a full money back guarantee for everything we sell.
You can only find out how good something is by trying it, and because of our 100% money back guarantee there's literally no risk to do so!
So, there's no reason not to click the Add to Cart button, is there?
See full terms...
Earn $8 on a $10 Purchase, and $16 on a $20 Purchase
We pay 80% royalties on purchases of $7.99 or more, and 80% royalties minus a 50 cent flat fee on purchases between $0.99 and $7.98. You earn $8 on a $10 sale, and $16 on a $20 sale. So, if we sell 5000 non-refunded copies of your book for $20, you'll earn $80,000.
(Yes, some authors have already earned much more than that on Leanpub.)
In fact, authors have earnedover $13 millionwriting, publishing and selling on Leanpub.
Learn more about writing on Leanpub
Free Updates. DRM Free.
If you buy a Leanpub book, you get free updates for as long as the author updates the book! Many authors use Leanpub to publish their books in-progress, while they are writing them. All readers get free updates, regardless of when they bought the book or how much they paid (including free).
Most Leanpub books are available in PDF (for computers) and EPUB (for phones, tablets and Kindle). The formats that a book includes are shown at the top right corner of this page.
Finally, Leanpub books don't have any DRM copy-protection nonsense, so you can easily read them on any supported device.
Learn more about Leanpub's ebook formats and where to read them