Книга: Black Hat Python: Python Programming for Hackers and Pentesters
Назад: 8. Common Trojaning Tasks on Windows
Дальше: 10. Windows Privilege Escalation

] After the document is encrypted, we’ll automate the process of posting the encrypted document to a blog on tumblr.com. This will enable us to dead-drop the document and retrieve it when we want to without anyone else being able to decrypt it. By .

(using urllib2 and HTMLParser), which I will leave as a homework assignment for you. The other thing to consider is that in our ie_exfil.py script, we pad the last 256 bytes with the space character, and this might break certain file formats. Another idea for extending the project is to encrypt a length field at the beginning of the blog post contents that tells you the original size of the document before you padded it. You can then read in this length after decrypting the blog post contents and trim the file to that exact size.



[] The Python package PyCrypto can be installed from .

© RuTLib.com 2015-2018