Before you can experience the art of gray hat Python programming, you must work through the least exciting portion of this book, setting up your development environment. It is essential that you have a solid development environment, which allows you to spend time absorbing the interesting information in this book rather than stumbling around trying … Continue reading 1. SETTING UP YOUR DEVELOPMENT ENVIRONMENT
Category: Books
GRAY HAT PYTHON – INTRODUCTION
I learned Python specifically for hacking—and I’d venture to say that’s a true statement for a lot of other folks, too. I spent a great deal of time hunting around for a language that was well suited for hacking and reverse engineering, and a few years ago it became very apparent that Python was becoming … Continue reading GRAY HAT PYTHON – INTRODUCTION
Chapter 1. Making Paper Cryptography Tools
Before we start writing cipher programs, let’s look at the process of encrypting and decrypting with just pencil and paper. This will help you understand how ciphers work and the math that goes into producing their secret messages. In this chapter, you’ll learn what we mean by cryptography and how codes are different from ciphers. … Continue reading Chapter 1. Making Paper Cryptography Tools
Chapter 1. Introduction to algorithms / 3
Running time Any time I talk about an algorithm, I’ll discuss its running time. Generally you want to choose the most efficient algorithm whether you’re trying to optimize for time or space. Back to binary search. How much time do you save by using it? Well, the first approach was to check each number, one … Continue reading Chapter 1. Introduction to algorithms / 3
Chapter 2. System Fundamentals
I. BackgroundA. Networking technologiesC. System technologiesD. Transport protocolsG. Telecommunications technologiesH. Backup and restoreIII. SecurityA. Systems security controlsB. Application/fileserverC. FirewallsE. Network securityO. Trusted networksP. VulnerabilitiesIV. Tools/Systems/ProgramsG. Boundary protection appliancesH. Network topologiesI. SubnettingK. Domain Name System (DNS)L. Routers/modems/switchesO. Operating environmentsV. Procedures/MethodologyG. TCP/IP networking Exploring Network Topologies Whether you are a veteran or a novice—or just have a … Continue reading Chapter 2. System Fundamentals
CHAPTER 2. Reconnaissance: Information Gathering for the Ethical Hacker / 2
Google Hacking A useful tactic in footprinting a target was popularized mainly in late 2004 by a guy named Johnny Long, who was part of an IT security team at his job. While performing pen tests and ethical hacking, he started paying attention to how the search strings worked in Google. The search engine has … Continue reading CHAPTER 2. Reconnaissance: Information Gathering for the Ethical Hacker / 2
Chapter 1. Introduction to algorithms / 2
Let’s see how to write binary search in Python. The code sample here uses arrays. If you don’t know how arrays work, don’t worry; they’re covered in the next chapter. You just need to know that you can store a sequence of elements in a row of consecutive buckets called an array. The buckets are … Continue reading Chapter 1. Introduction to algorithms / 2
Chapter 3. Structured Program Development in C
3.1 Introduction Before writing a program to solve a particular problem, we must have a thorough understanding of the problem and a carefully planned solution approach. Chapters 3 and 4 discuss techniques that facilitate the development of structured computer programs. In Section 4.12, we present a summary of the structured programming techniques developed here and … Continue reading Chapter 3. Structured Program Development in C
INTRODUCTION
The purpose of this book is to provide individuals the information once held only by governments and a few black hat hackers. In this day and age, individuals stand in the breach of cyberwar, not only against black hat hackers, but sometimes against governments. If you find yourself in this position, either alone or as … Continue reading INTRODUCTION
CHAPTER 2. Reconnaissance: Information Gathering for the Ethical Hacker
In this chapter you will • Define active and passive footprinting• Identify methods and procedures in information gathering• Understand the use of social networking, search engines, and Google hacking in information gathering• Understand the use of whois, ARIN, and nslookup in information gathering• Describe the DNS record types Footprinting Gathering information about your intended target … Continue reading CHAPTER 2. Reconnaissance: Information Gathering for the Ethical Hacker