这个资源找来不容易。说是手册,作者实在是太谦虚了,基本上可以作为Web安全的百科全书,呵呵。至少个人是这样认为的。 绝对是物有所值,知识点全面,基本上涵盖了OWASP Top10的所有内容:包括攻击方式和解法。对于研究Web安全的启发非常大,大牛的作品就是不一样。
2021-12-25 10:22:11 4.83MB Web应用 安全 手册
1
Network Forensics - Tracking Hackers through Cyberspace 英文无水印pdf pdf所有页面使用FoxitReader和PDF-XChangeViewer测试都可以打开 本资源转载自网络,如有侵权,请联系上传者或csdn删除 本资源转载自网络,如有侵权,请联系上传者或csdn删除
2021-11-24 16:05:39 19.64MB Network Forensics Tracking Hackers
1
Black.Hat.Python.Python.Programming.for.Hackers.pdf python hacker programming
2021-10-30 11:56:51 3.02MB python hackers
1
Python hacker. Those are two words you really could use to describe me. At Immunity, I am lucky enough to work with people who actually, really, know how to code Python. I am not one of those people. I spend a great deal of my time penetration testing, and that requires rapid Python tool development, with a focus on execution and delivering results (not necessarily on prettiness, optimization, or even stability). Throughout this book you will learn that this is how I code, but I also feel as though it is part of what makes me a strong pentester. I hope that this philosophy and style helps you as well. As you progress through the book, you will also realize that I don’t take deep dives on any single topic. This is by design. I want to give you the bare minimum, with a little flavor, so that you have some foundational knowl- edge. With that in mind, I’ve sprinkled ideas and homework assignments throughout the book to kickstart you in your own direction. I encourage you to explore these ideas, and I would love to hear back any of your own implementations, tooling, or homework assignments that you have done. xviii Preface As with any technical book, readers at different skill levels with Python (or information security in general) will experience this book differently. Some of you may simply grab it and nab chapters that are pertinent to a consulting gig you are on, while others may read it cover to cover. I would recommend that if you are a novice to intermediate Python programmer that you start at the beginning of the book and read it straight through in order. You will pick up some good building blocks along the way. To start, I lay down some networking fundamentals in Chapter 2 and slowly work our way through raw sockets in Chapter 3 and using Scapy in Chapter 4 for some more interesting network tooling. The next section of the book deals with hacking web applications, starting with your own custom tooling in Chapter 5 and then extending the popular Burp Suite in Ch
2021-10-30 11:53:54 10.08MB hacker python black_hat
1
Linux Basics for Hackers 中文版
2021-10-22 08:22:56 5.58MB Linux  Hacker
1
how-hackers-learn-and-why-you-want-this-in-your-school.pdf
2021-08-21 19:00:32 861KB 安全
Linux Basics for Hackers_ Getting Started
2021-08-03 09:00:15 3.8MB LinuxBasicsfor
1
英文版Hackers.and.Painters.May.2010(完美版).pdf
1
Hackers Painters Big ideas from the computer age!
2021-07-21 23:12:33 1.77MB Hackers Painters
1
Modern cars are more computerized than ever. Infotainment and navigation systems, Wi-Fi, automatic software updates, and other innovations aim to make driving more ­convenient. But vehicle technologies haven’t kept pace with today’s more hostile security environment, leaving ­millions vulnerable to attack. The Car Hacker’s Handbook will give you a deeper understanding of the computer systems and embedded software in modern ­vehicles. It begins by examining vulnerabilities and providing detailed explanations of communications over the CAN bus and ­between devices and systems. Then, once you have an understanding of a ­vehicle’s communication network, you’ll learn how to ­intercept data and perform specific hacks to track vehicles, unlock doors, glitch engines, flood communication, and more. With a focus on low-cost, open source hacking tools such as Metasploit, Wireshark, Kayak, can-utils, and ­ChipWhisperer, The Car Hacker’s Handbook will show you how to: Build an accurate threat model for your vehicle Reverse engineer the CAN bus to fake engine signals Exploit vulnerabilities in diagnostic and data-logging systems Hack the ECU and other firmware and embedded systems Feed exploits through infotainment and vehicle-to-vehicle communication systems Override factory settings with performance-tuning techniques Build physical and virtual test benches to try out exploits safely If you’re curious about automotive security and have the urge to hack a two-ton computer, make The Car Hacker’s Handbook your first stop.
2021-06-16 16:45:13 23.85MB Car Hackers Handbook
1