Black Hat Python: Python Programming for Hackers and Pentesters
Super Savings Item! Save 38% on the Black Hat Python: Python Programming for Hackers and Pentesters by No Starch Press at Translate This Website. MPN: illustrations. Hurry! Limited time offer. Offer valid only while supplies last. When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the
When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen?
In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you’ll explore the darker side of Python’s capabilities—writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, and more.
You’ll learn how to:
–Create a trojan command-and-control using GitHub
–Detect sandboxing and automate common malware tasks, like keylogging and screenshotting
–Escalate Windows privileges with creative process control
–Use offensive memory forensics tricks to retrieve password hashes and inject shellcode into a virtual machine
–Extend the popular Burp Suite web-hacking tool
–Abuse Windows COM automation to perform a man-in-the-browser attack
–Exfiltrate data from a network most sneakily
Insider techniques and creative challenges throughout show you how to extend the hacks and how to write your own exploits.
When it comes to offensive security, your ability to create powerful tools on the fly is indispensable. Learn how in Black Hat Python.
Uses Python 2
|Manufacturer:||No Starch Press|
|Brand:||No Starch Press|
|Publisher:||No Starch Press|
|Studio:||No Starch Press|
|Item Weight:||0.95 pounds|
|Item Size:||0.55 x 9.25 x 9.25 inches|
|Package Weight:||0.95 pounds|
|Package Size:||6.9 x 0.7 x 0.7 inches|
Have questions about this item, or would like to inquire about a custom or bulk order?
If you have any questions about this product by No Starch Press, contact us by completing and submitting the form below. If you are looking for a specif part number, please include it with your message.
Related Best Sellers
By CreateSpace Independent Publishing Platform
ean: 9781539490197, isbn: 153949019X,
Become A Programming Master By Learning These Fundamentals Languages Discover the secret right here, right now ! Have you ever wanted to become a programmer ? If you answered "yes", this book is made for you. You will learn the most popular computer ...
By O Reilly Media
mpn: 978-1-4493-8839-3, ean: 9781449388393, isbn: 9781449388393,
This 25th anniversary edition of Steven Levy's classic book traces the exploits of the computer revolution's original hackers -- those brilliant and eccentric nerds from the late 1950s through the early '80s who took risks, bent the rules, and pushed...
By CreateSpace Independent Publishing Platform
ean: 9781537792125, isbn: 1537792121,
"Install Tor Browser On ANY Device!"Buy It Now For $9.99 $2.99 (70% Off)*OFFER* Buy a paperback copy of this Tor book and receive the Kindle version for only .99 cents!We’re living in an era defined by free-flowing information because of the fast-p...
By XML Press
ean: 9781937434625, isbn: 9781937434625,
The Language of Cybersecurity defines 52 terms that every business professional should know about cybersecurity, even professionals who are not specialists. Anyone who uses any kind of computing device needs to understand the importance of cybersecur...
By Hosmer Chet
ean: 9780124186767, isbn: 0124186769,
Python Forensics provides many never-before-published proven forensic modules, libraries, and solutions that can be used right out of the box. In addition, detailed instruction and documentation provided with the code samples will allow even novice P...
By Morgan Kaufmann
ean: 9780123943972, isbn: 0123943973,
The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they rel...
mpn: illustrations, ean: 9780735617223, isbn: 0735617228,
Keep black-hat hackers at bay with the tips and techniques in this entertaining, eye-opening book! Developers will learn how to padlock their applications throughout the entire development process—from designing secure applications to writing robus...
By Siriwardena Prabath
ean: 9781430268185, isbn: 1430268182,
Advanced API Security is a complete reference to the next wave of challenges in enterprise security--securing public and private APIs. API adoption in both consumer and enterprises has gone beyond predictions. It has become the ‘coolest’ way of e...
mpn: Illustrated, ean: 9781597499637, isbn: 1597499633,
SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." –Richard Bejtlich, Tao Secur...
By Addison-Wesley Professional
mpn: 36080949, ean: 9780321822130, isbn: 9780321822130,
Learn the Root Causes of Software Vulnerabilities and How to Avoid Them Commonly exploited software vulnerabilities are usually caused by avoidable software defects. Having analyzed tens of thousands of vulnerability reports since 1988, CERT has d...