Programming for Hackers - Preview.pdf

(7854 KB) Pobierz
TEAM
Editor-in-Chief

Joanna Kretowicz 

joanna.kretowicz@eforensicsmag.com
Editors:
Marta Sienicka

sienicka.marta@hakin9.org
Marta Strzelec

marta.strzelec@hakin9.org
Anna Kondzierska

anna.kondzierska@hakin9.org
Proofreader:
Lee McKenzie
Senior Consultant/Publisher:
Paweł Marciniak 
CEO:
Joanna Kretowicz 

joanna.kretowicz@hakin9.org
 
Marketing Director:
Joanna Kretowicz 

joanna.kretowicz@hakin9.org
DTP
Marta Sienicka

sienicka.marta@hakin9.org
Cover Design
Hiep Nguyen Duc
Publisher
Hakin9 Media Sp. z o.o.

02-676 Warszawa

ul. Postępu 17D 

Phone: 1 917 338 3631 
www.hakin9.org
Proofreaders
&
Betatesters:
Lee McKenzie
Avi Benchimol
Bernhard Waldecker
Hammad Arshed
Ivan Gutierrez Agramont
John Webb
Jose Luis Herrera
David von Vistauxx
Tom Updegrove
Diane Barrett
Felipe Martins
Gmn
K S Abhiraj
greg mckoy
Hani Ragab
Amit Chugh
Arthur Tumanyan
Da Co
devzero2000
All trademarks, trade names, or logos mentioned or used are the
property of their respective owners.
The techniques described in our articles may only be used in private,
local networks. The editors hold no responsibility for misuse of the
presented techniques or consequent data loss.
Dear Readers!
Today's issue of Hakin9 is dedicated to programming. There is an ongoing question whether programming
skills are essential to being a good hacker. Most agree that knowing how to code is necessary, although not
obligatory to become a hacker, as it will definitely help you understand some techniques and processes. If you
know how to code, you will be able to dissect code and analyze it, and to write your own scripts or your own
hacking tools.
We decided to
 focus
mostly on Python. Why? Because Python is an extremely powerful language and it easy
to learn at the same time. With Python you can achieve your results with minimal coding, and it does not need
to be compiled.
 
I strongly recommend reading Python for hackers: Extract gold from systems by Adrian
Rodriguez Garcia and The dangers of metadata by Verónica Berengue. In the first one you will learn about data
extraction from Microsoft Windows systems and the second one will focus on extraction images and PDF docu-
ments. More about Python and its capabilities can be found in Programming In Python, Forensic Analysis For
Network and Programming for hackers.
Samrta Das and Prasoon Nigam prepared two tutorials about Burp Suite, one of the most popular tools for per-
forming security testing of web applications. Their step-by-step articles will help you use Burp’s features easily
and efficiently.
There are a lot more articles inside, and I hope that you will find something interesting for yourself there.
We want to thank you for all your support, we appreciate it a lot. If you like this publication you can share it
and tell your friends about it! Every one of your comments is important to us. Special thanks to Beta Testers
and Proofreaders who helped with this issue.
See you next month!
Enjoy your reading,
Hakin9 Magazine’s
Editorial Team
Programming exercises - Useful links and sources
Python for hackers: Extract gold from systems
by Adrian Rodriguez Garcia
7
14
What is Burp Suite?
by Pprasoon Nigam
36
“I always tell people: learn a programming language
that will help you achieve your goals”
Interview with Laurence Bradford, the creator of Learn to Code
With Me
83
Understanding CyberCrime and CyberCriminals
by Colin Renouf
89
Programming for Hackers
by Amit Ranjan
103
The dangers of metadata
by Verónica Berenguer
115
5
Harnessing the lesser known “Burp macros” for
Penetration Testing Web Apps
by Samrat Das
133
“Python developers are such a large and diverse
group, how could they not have a podcast?”
Interview with Michael Kennedy, the creator of Talk
Python To Me Podcast
Source Code review
by Atul Singh
146
155
165
186
Wireless Hacking Tools
by Souvik Mal
Programming In Python Forensic Analysis For Network
by Julio César Pérez Barbosa
6
Zgłoś jeśli naruszono regulamin