"Python Stunts: Using Python to Become a Top Hacker"

        "Python Stunts: Using Python to Become a Top Hacker"

        Let's talk about the first chapter of my trial reading, Python Basics. As a Java developer, through the content of the author's book, I have a basic understanding of Python. Although the language is different, we can see many similarities in terms of syntax. shadow. The author's explanation of code examples made me, a Python layman, feel that Python is not difficult, and it is quite interesting to learn. The second chapter, using Python for penetration testing, suddenly raised my interest. The author used vivid descriptions and solid cases to explain how to perform password cracking and port scanning through Python, and how to build an SSH botnet using FTP cracking and infecting WEB servers, etc. These secrets are all taught. I see that it is called a fun! So that the content of electronic forensics, network traffic analysis, wireless network attacks, network spying, and killing-free, etc., satiated my appetite! Finally, I have to admire the superb level of the translator! A technical book written by a foreigner can give readers such a strong sense of identity and curiosity through the translator's thoughts and insights! It can be seen that the translation level of the book seems to be at its peak!

         To be honest, after reading the trial chapter of "Python Stunts: Using Python to Become a Top Hacker", I felt a sense of unease and joy. I'm uneasy, because after seeing the catalog, I found that the network and machine we used could be played like this, which made my back shiver! It is incredible that since the Python scripting language can play so much, the syntax of the Python language is still so simple. Not only can a password cracking program be written in Python, but also a port scanner can be written in Python to crack SSH passwords, hack the entire computer group, and build an SSH botnet, allowing all controlled computers to automatically execute the instructions we want. . You can also obtain more sensitive information by cracking the FTP username and password, then indirectly cracking the WEB server, and implanting Trojan horses or viruses. The above two extremely harmful attack methods are the beginning of penetration testing in hacker attacks. Electronic forensics, network process analysis, as well as wireless network attacks and network spying are just commonplace for hackers to attack. The virus introduced at the end Avoid killing, I feel that there may be a hacker in the current computer, and the computer in front of me seems to be naked in front of the hacker. Of course, not only did I have such a reaction after reading the content of the book, but when I recalled the events that happened at work, I became more and more aware of the importance and urgency of network security, as well as the need to understand network security. Two years ago, the Oracle database appeared in my company overnight, and suddenly it disappeared. At that time, I checked the server, checked the log, and scanned the disk, but no problems were found, but the database was gone. If it is not the monitoring system alarm , the problem may become more serious, although everyone knows that it may be done by hackers, but no one knows how! Fortunately, the company has a backup database, and only one day's data is lost. Since then, however, the company has set up a security department and has begun to pay extra attention to cybersecurity. The last time I met a hacker was when the new company's online OA server disk was locked..., alas, I don't want to mention the sad past! So I think network security is everywhere, and network security should be a must-have for every IT practitioner!

        Although there are a lot of worries, I was fortunate to meet the book "Python Stunts: Using Python to Become a Top Hacker", which gave me the honor to see the true face of hackers. It turns out that they have a helper Python behind their awesomeness! What excites me the most is that "Python Stunts: Using Python to Become a Top Hacker" shows all the details of hacking work, allowing us to have a deeper understanding and understanding of network security and computer security. The ancients said that if you know yourself and your enemy, you will not be imperiled in a hundred battles! If information security is so important, as an IT builder, we should understand the mysteries. If we know how they do it, then we can start from these aspects and use the barrel theory to make up for our own Weaknesses, strengthen yourself. While information is never completely secure, we can become more secure by solidifying ourselves.

Guess you like

Origin http://10.200.1.11:23101/article/api/json?id=326988651&siteId=291194637