Black Hat Python

Regular price €40.99
A01=Justin Seitz
Age Group_Uncategorized
Age Group_Uncategorized
Author_Justin Seitz
automatic-update
branding
business
business books
Category1=Non-Fiction
Category=UMW
cloud computing
computer
computer networking
computers
COP=United States
crypto
cryptography
cyber security
cybersecurity
dark web
Delivery_Delivery within 10-20 working days
economics
economics books
economy
eq_bestseller
eq_computing
eq_isMigrated=2
eq_nobargain
eq_non-fiction
finance
finance books
gifts for geeks
gifts for programmers
hackers
hacking
hacking books
investing
investing books
investing for beginners
investment books
Language_English
marketing
money
network
networking
PA=In stock
Price_€20 to €50
privacy
private equity
PS=Active
python 3
python programming
risk
risk management
security
softlaunch
stock
stocks
strategy
tech
technology
trading

Product details

  • ISBN 9781593275907
  • Dimensions: 178 x 234mm
  • Publication Date: 21 Dec 2014
  • Publisher: No Starch Press,US
  • Publication City/Country: US
  • Product Form: Paperback
  • Language: English
Delivery/Collection within 10-20 working days

Our Delivery Time Frames Explained
2-4 Working Days: Available in-stock

10-20 Working Days: On Backorder

Will Deliver When Available: On Pre-Order or Reprinting

We ship your order once all items have arrived at our warehouse and are processed. Need those 2-4 day shipping items sooner? Just place a separate order for them!

When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen? In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you ll explore the darker side of Python s capabilities writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, and more. You ll learn how to: Create a trojan command-and-control using GitHub Detect sandboxing and automate comèmon malware tasks, like keylogging and screenshotting Escalate Windows privileges with creative process control Use offensive memory forensics tricks to retrieve password hashes and inject shellcode into a virtual machine Extend the popular Burp Suite web-hacking tool Abuse Windows COM automation to perform a man-in-the-browser attack Exfiltrate data from a network most sneakily Insider techniques and creative challenges throughout show you how to extend the hacks and how to write your own exploits. When it comes to offensive security, your ability to create powerful tools on the fly is indispensable. Learn how in Black Hat Python. Uses Python 2
Justin Seitz is a Senior Security Researcher for Immunity, Inc., where he spends his time bug hunting, reverse engineering, writing exploits, and coding Python. He is the author of Gray Hat Python, the first book to cover the use of Python for security analysis.