When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen? In Black Hat Python , the latest from Justin Seitz (author of the best-selling Gray Hat Python ), you'll explore the darker side of Python's capabilities--writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, and more. You'll learn how to: -Create a trojan command-and-control using GitHub -Detect sandboxing and ...
Read More
When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen? In Black Hat Python , the latest from Justin Seitz (author of the best-selling Gray Hat Python ), you'll explore the darker side of Python's capabilities--writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, and more. You'll learn how to: -Create a trojan command-and-control using GitHub -Detect sandboxing and automate com-mon malware tasks, like keylogging and screenshotting -Escalate Windows privileges with creative process control -Use offensive memory forensics tricks to retrieve password hashes and inject shellcode into a virtual machine -Extend the popular Burp Suite web-hacking tool -Abuse Windows COM automation to perform a man-in-the-browser attack -Exfiltrate data from a network most sneakily Insider techniques and creative challenges throughout show you how to extend the hacks and how to write your own exploits. When it comes to offensive security, your ability to create powerful tools on the fly is indispensable. Learn how in Black Hat Python . Uses Python 2
Read Less
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
May have some shelf-wear due to normal use. Your purchase funds free job training and education in the greater Seattle area. Thank you for supporting Goodwill's nonprofit mission!
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
Good. The cover shows wear with possible indentations, creases, and small tears. The cover is slightly curled. The cover has folded corners. The book is slightly curled. The book has corner dings. The pages show wear that may include evidence of handling, smudges, and edge discoloration.
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority!
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
Very good. Connecting readers with great books since 1972! Used books may not include companion materials, and may have some shelf wear or limited writing. We ship orders daily and Customer Service is our top priority!
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
Very good. Connecting readers with great books since 1972! Used books may not include companion materials, and may have some shelf wear or limited writing. We ship orders daily and Customer Service is our top priority!
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
Fine. Trade paperback (US). Glued binding. 192 p. Contains: Illustrations, color. In Stock. 100% Money Back Guarantee. Brand New, Perfect Condition, allow 4-14 business days for standard shipping. To Alaska, Hawaii, U.S. protectorate, P.O. box, and APO/FPO addresses allow 4-28 business days for Standard shipping. No expedited shipping. All orders placed with expedited shipping will be cancelled. Over 3, 000, 000 happy customers.