This poignant selection of artifacts-and their stories-from September 11 provides an official, lasting record of that day's experience. In both text and photography, the story of September 11 is told through a selection of powerfully moving artifacts from the 9/11 museum's collection that serve as touchstones to the day and its aftermath. From crushed FDNY trucks to the steel that was pierced as planes struck the Twin Towers, from victims' property pulled from the wreckage and returned to families (who later donated the property to the museum) to spontaneous memorials collected from around Ground Zero, the array of objects tell complex and often surprising stories. Poignant artifacts as monumental as the Vesey Street staircase-which offered an escape for thousands fleeing the towers-and as intimate as a loved one's wedding band or last recorded phone message are selected to illuminate people's experiences during and after September 11, 2001, and February 26, 1993. T
Fully-updated for Python 3, the second edition of this worldwide bestseller (over 100,000 copies sold) explores the stealthier side of programming and brings you all new strategies for your hacking projects. When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. In this second edition of the bestselling Black Hat Python, you'll explore the darker side of Python's capabilities: everything from writing network sniffers, stealing email credentials, and bruteforcing directories to crafting mutation fuzzers, investigating virtual machines, and creating stealthy trojans. All of the code in this edition has been updated to Python 3.x. You'll also find new coverage of bit shifting, code hygiene, and offensive forensics with the Volatility Framework as well as expanded explanations of the Python libraries ctypes, struct, lxml, and BeautifulSoup, and offensive hacking strategies like splitting bytes, leveraging computer vision libraries, and scraping websites. You'll even learn how to:
- Create a trojan command-and-control server using GitHub
- Detect sandboxing and automate common malware tasks like keylogging and screenshotting
- Extend the Burp Suite web-hacking tool
- Escalate Windows privileges with creative process control
- Use offensive memory forensics tricks to retrieve password hashes and find vulnerabilities on a virtual machine
- Abuse Windows COM automation
- Exfiltrate data from a network undetected When it comes to offensive security, you need to be able to create powerful tools on the fly. Learn how with Black Hat Python.
Product details
- Paperback | 200 pages
- 178 x 234 x 17.78mm | 408.23g
- 18 May 2021
- No Starch Press,US
- San Francisco, United States
- English
- 2nd Edition
- 1718501129
- 9781718501126
- 17,973
Download Black Hat Python, 2nd Edition : Python Programming for Hackers and Pentesters (9781718501126).pdf, available at ebookdownloadfree.co for free.
Komentar
Posting Komentar