The IDA Pro Book: The Unofficial Guide to the World’s Most Popular Disassembler

Rating: 
Amazon Price: $59.95 (as of October 23, 2017 13:57 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

No source code? No problem. With IDA Pro, you live in a source code-optional world. IDA can automatically analyze the millions of opcodes that make up an executable and present you with a disassembly. But at that point, your work is just beginning. With The IDA Pro Book, you'll learn how to turn that mountain of mnemonics into something you can actually use.

Hailed by the creator of IDA Pro as the "long-awaited" and "information-packed" guide to IDA, The IDA Pro Book covers everything from the very first steps to advanced automation techniques. While other disassemblers slow your analysis with inflexibility, IDA invites you to customize its output for improved readability and usefulness. You'll save time and effort as you learn to: Identify known library routines, so you can focus your analysis on other areas of the code Extend IDA to support new processors and filetypes, making disassembly possible for new or obscure architectures Explore popular plug-ins that make writing IDA scripts easier, allow collaborative reverse engineering, and much more Utilize IDA's built-in debugger to tackle obfuscated code that would defeat a stand-alone disassembler
Continue reading “The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler”

Regular Expressions Cookbook

Rating: 
Amazon Price: N/A (as of October 23, 2017 12:15 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Take the guesswork out of using regular expressions. With more than 140 practical recipes, this cookbook provides everything you need to solve a wide range of real-world problems. Novices will learn basic skills and tools, and programmers and experienced users will find a wealth of detail. Each recipe provides samples you can use right away.

This revised edition covers the regular expression flavors used by C#, Java, JavaScript, Perl, PHP, Python, Ruby, and VB.NET. You’ll learn powerful new tricks, avoid flavor-specific gotchas, and save valuable time with this huge library of practical solutions.Learn regular expressions basics through a detailed tutorialUse code listings to implement regular expressions with your language of choiceUnderstand how regular expressions differ from language to languageHandle common user input with recipes for validation and formattingFind and manipulate words, special characters, and lines of textDetect integers, floating-point numbers, and other numerical formatsParse source code and process log filesUse regular expressions in URLs, paths, and IP addressesManipulate HTML, XML, and data exchange formatsDiscover little-known regular expression tricks and techniques

Bots in WhatsApp. Übersicht, Anwendungsfälle, Einsatz und Schwachstellen (German Edition)

Amazon Price: N/A (as of October 24, 2017 05:56 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Studienarbeit aus dem Jahr 2016 im Fachbereich Informatik – Wirtschaftsinformatik, Note: 1,3, Duale Hochschule Baden-Württemberg, Ravensburg, früher: Berufsakademie Ravensburg (Mobile Informatik), Veranstaltung: Verteilte Systeme, Sprache: Deutsch, Abstract: In dieser Arbeit soll zunächst ein Grundverständnis und die Funktionsweise von Chatbots dargelegt werden. Dabei soll die Technologie der Chatbots anhand von A.I.M.L. näher beschrieben werden. Weiter sollen in dieser Arbeit Anwendungsfälle beschrieben werden, bei denen Bots die Nutzung des Internet im Vergleich zu Webseiten vereinfachen können. So werden die Messenger-Plattformen jeden Monat mächtiger, wehalb die Nutzung von Chatbots immer interessanter wird. Daher bieten Chatbots großes Potential was die Vereinfachung des Internets angeht. Im Anschluss an die Anwendungsfälle soll dem Lesen ein Praxisbeispiel gegeben werden, inwiefern ein Raspberry Pi mittels WhatsApp gesteuert werden kann. Darauffolgend werden aufkommende Schwachstellen im Rahmen von Chatbots erläutert. So spielen hier Themen wie Datensicherheit, Persönlichkeitsrechte, und Cyber-Kriminalität eine wesentliche Rolle. Letztendlich erfolgt eine kritische Würdigung in welcher der Einsatz von Chatbots bewertet wird.

Viele Unternehmen setzen auf eigene Apps, welche aber immer seltener angenommen werden. Die Frage ist: Werden Apps von Bots verdrängt? "Chatbots sind die neuen Apps ", sagte Microsofts CEO Satya Nadella Anfang des Jahres. Mit dieser Aussage ist Nadella nicht allein. So gibt es viele Entscheidungsträger, welche diese Meinung teilen.
Continue reading “Bots in WhatsApp. Übersicht, Anwendungsfälle, Einsatz und Schwachstellen (German Edition)”

Coding for Penetration Testers: Building Better Tools

Rating: 
Amazon Price: $39.95 $16.97 You save: $22.98 (58%). (as of October 23, 2017 09:54 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Tools used for penetration testing are often purchased or downloaded from the Internet. Each tool is based on a programming language such as Perl, Python, or Ruby. If a penetration tester wants to extend, augment, or change the functionality of a tool to perform a test differently than the default configuration, the tester must know the basics of coding for the related programming language. Coding for Penetration Testers provides the reader with an understanding of the scripting languages that are commonly used when developing tools for penetration testing. It also guides the reader through specific examples of custom tool development and the situations where such tools might be used. While developing a better understanding of each language, the reader is guided through real-world scenarios and tool development that can be incorporated into a tester's toolkit.Discusses the use of various scripting languages in penetration testingPresents step-by-step instructions on how to build customized penetration testing tools using Perl, Ruby, Python, and other languagesProvides a primer on scripting including, but not limited to, Web scripting, scanner scripting, and exploitation scripting

Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

Rating: 
Amazon Price: N/A (as of October 23, 2017 11:56 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker’s tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus.

– Demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts.
– Write code to intercept and analyze network traffic using Python. Craft and spoof wireless frames to attack wireless and Bluetooth devices.
– Data-mine popular social media websites and evade modern anti-virus.