The IDA Pro Book: The Unofficial Guide to the World’s Most Popular Disassembler

Rating: 
Amazon Price: $59.95 (as of January 19, 2018 04:41 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

No source code? No problem. With IDA Pro, you live in a source code-optional world. IDA can automatically analyze the millions of opcodes that make up an executable and present you with a disassembly. But at that point, your work is just beginning. With The IDA Pro Book, you'll learn how to turn that mountain of mnemonics into something you can actually use.

Hailed by the creator of IDA Pro as the "long-awaited" and "information-packed" guide to IDA, The IDA Pro Book covers everything from the very first steps to advanced automation techniques. While other disassemblers slow your analysis with inflexibility, IDA invites you to customize its output for improved readability and usefulness. You'll save time and effort as you learn to: Identify known library routines, so you can focus your analysis on other areas of the code Extend IDA to support new processors and filetypes, making disassembly possible for new or obscure architectures Explore popular plug-ins that make writing IDA scripts easier, allow collaborative reverse engineering, and much more Utilize IDA's built-in debugger to tackle obfuscated code that would defeat a stand-alone disassembler
Continue reading “The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler”

Bots in WhatsApp. Übersicht, Anwendungsfälle, Einsatz und Schwachstellen (German Edition)

Amazon Price: N/A (as of January 19, 2018 12:32 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Studienarbeit aus dem Jahr 2016 im Fachbereich Informatik – Wirtschaftsinformatik, Note: 1,3, Duale Hochschule Baden-Württemberg, Ravensburg, früher: Berufsakademie Ravensburg (Mobile Informatik), Veranstaltung: Verteilte Systeme, Sprache: Deutsch, Abstract: In dieser Arbeit soll zunächst ein Grundverständnis und die Funktionsweise von Chatbots dargelegt werden. Dabei soll die Technologie der Chatbots anhand von A.I.M.L. näher beschrieben werden. Weiter sollen in dieser Arbeit Anwendungsfälle beschrieben werden, bei denen Bots die Nutzung des Internet im Vergleich zu Webseiten vereinfachen können. So werden die Messenger-Plattformen jeden Monat mächtiger, wehalb die Nutzung von Chatbots immer interessanter wird. Daher bieten Chatbots großes Potential was die Vereinfachung des Internets angeht. Im Anschluss an die Anwendungsfälle soll dem Lesen ein Praxisbeispiel gegeben werden, inwiefern ein Raspberry Pi mittels WhatsApp gesteuert werden kann. Darauffolgend werden aufkommende Schwachstellen im Rahmen von Chatbots erläutert. So spielen hier Themen wie Datensicherheit, Persönlichkeitsrechte, und Cyber-Kriminalität eine wesentliche Rolle. Letztendlich erfolgt eine kritische Würdigung in welcher der Einsatz von Chatbots bewertet wird.

Viele Unternehmen setzen auf eigene Apps, welche aber immer seltener angenommen werden. Die Frage ist: Werden Apps von Bots verdrängt? "Chatbots sind die neuen Apps ", sagte Microsofts CEO Satya Nadella Anfang des Jahres. Mit dieser Aussage ist Nadella nicht allein. So gibt es viele Entscheidungsträger, welche diese Meinung teilen.
Continue reading “Bots in WhatsApp. Übersicht, Anwendungsfälle, Einsatz und Schwachstellen (German Edition)”

Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

Rating: 
Amazon Price: N/A (as of January 19, 2018 16:03 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker’s tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus.

– Demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts.
– Write code to intercept and analyze network traffic using Python. Craft and spoof wireless frames to attack wireless and Bluetooth devices.
– Data-mine popular social media websites and evade modern anti-virus.

Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

Rating: 
Amazon Price: $49.95 $38.85 You save: $11.10 (22%). (as of January 19, 2018 16:03 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker's tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus.
– Demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts.
– Write code to intercept and analyze network traffic using Python. Craft and spoof wireless frames to attack wireless and Bluetooth devices.
– Data-mine popular social media websites and evade modern anti-virus.

The IDA Pro Book: The Unofficial Guide to the World’s Most Popular Disassembler

Rating: 
Amazon Price: $69.95 $39.96 You save: $29.99 (43%). (as of January 19, 2018 00:39 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

No source code? No problem. With IDA Pro, the interactive disassembler, you live in a source code-optional world. IDA can automatically analyze the millions of opcodes that make up an executable and present you with a disassembly. But at that point, your work is just beginning. With The IDA Pro Book, you'll learn how to turn that mountain of mnemonics into something you can actually use.

Hailed by the creator of IDA Pro as "profound, comprehensive, and accurate," the second edition of The IDA Pro Book covers everything from the very first steps to advanced automation techniques. You'll find complete coverage of IDA's new Qt-based user interface, as well as increased coverage of the IDA debugger, the Bochs debugger, and IDA scripting (especially using IDAPython). But because humans are still smarter than computers, you'll even learn how to use IDA's latest interactive and scriptable interfaces to your advantage.
Continue reading “The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler”