9781718501126

Black Hat Python, 2nd Edition: Python Programming for Hackers and Pentesters

by ;
  • ISBN13:

    9781718501126

  • ISBN10:

    1718501129

  • Edition: 2nd
  • Format: Paperback
  • Copyright: 2021-04-14
  • Publisher: No Starch Press

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
  • Buyback Icon We Buy This Book Back!
    In-Store Credit: $2.63
    Check/Direct Deposit: $2.50
    PayPal: $2.50
List Price: $44.99 Save up to $11.25
  • Rent Book $33.74
    Add to Cart Free Shipping Icon Free Shipping

    TERM
    PRICE
    DUE
    USUALLY SHIPS IN 2-3 BUSINESS DAYS
    *This item is part of an exclusive publisher rental program and requires an additional convenience fee. This fee will be reflected in the shopping cart.

Supplemental Materials

What is included with this book?

Summary

Fully-updated for Python 3, the second edition of this worldwide bestseller (over 100,000 copies sold) explores the stealthier side of programming and brings you all new strategies for your hacking projects.

When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. In this second edition of the bestselling Black Hat Python, you’ll explore the darker side of Python’s capabilities: everything from writing network sniffers, stealing email credentials, and bruteforcing directories to crafting mutation fuzzers, investigating virtual machines, and creating stealthy trojans.
 
All of the code in this edition has been updated to Python 3.x. You’ll also find new coverage of bit shifting, code hygiene, and offensive forensics with the Volatility Framework as well as expanded explanations of the Python libraries ctypes, struct, lxml, and BeautifulSoup, and offensive hacking strategies like splitting bytes, leveraging computer vision libraries, and scraping websites.
 
You’ll even learn how to:
  • Create a trojan command-and-control server using GitHub
  • Detect sandboxing and automate common malware tasks like keylogging and screenshotting
  • Extend the Burp Suite web-hacking tool
  • Escalate Windows privileges with creative process control
  • Use offensive memory forensics tricks to retrieve password hashes and find vulnerabilities on a virtual machine
  • Abuse Windows COM automation
  • Exfiltrate data from a network undetected
  •  
    When it comes to offensive security, you need to be able to create powerful tools on the fly. Learn how with Black Hat Python.
     

    Author Biography

    Justin Seitz is the president and co-founder of Dark River Systems Inc., where he spends his time shipping Hunchly (https://www.hunch.ly), consulting for hedge funds and doing OSINT research. He is the author of Gray Hat Python (No Starch Press), the first book to cover Python for security analysis.

    Tim Arnold has worked as a professional Python software developer at the SAS Institute for more than 20 years. He contributes to several open source software projects and volunteers as a hacking trainer in his local community.

    Table of Contents

    Preface
    Chapter 1: Setting up Your Python Environment
    Chapter 2: The Network Basics
    Chapter 3: The Network: Raw Sockets and Sniffing
    Chapter 4: Owning the Network with Scapy
    Chapter 5: Web Hackery
    Chapter 6: Extending Burp Proxy
    Chapter 7: GitHub Command and Control
    Chapter 8: Common Trojaning Tasks on Windows
    Chapter 9: Fun with Internet Explorer
    Chapter 10: Windows Privilege Escalation
    Chapter 11: Automating Offensive Forensics
    Index

    Supplemental Materials

    What is included with this book?

    The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

    The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

    Rewards Program