Description

When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen? In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you ll explore the darker side of Python s capabilities writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, and more. You ll learn how to: Create a trojan command-and-control using GitHub Detect sandboxing and automate comèmon malware tasks, like keylogging and screenshotting Escalate Windows privileges with creative process control Use offensive memory forensics tricks to retrieve password hashes and inject shellcode into a virtual machine Extend the popular Burp Suite web-hacking tool Abuse Windows COM automation to perform a man-in-the-browser attack Exfiltrate data from a network most sneakily Insider techniques and creative challenges throughout show you how to extend th

Black Hat Python, 2nd Edition: Python Programming for Hackers and Pentesters

Product form

£38.69

Includes FREE delivery
RRP: £42.99 You save £4.30 (10%)
Usually despatched within 4 days
Paperback / softback by Justin Seitz , Tim Arnold

1 in stock

Short Description:

When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts.... Read more

    Publisher: No Starch Press,US
    Publication Date: 14/04/2021
    ISBN13: 9781718501126, 978-1718501126
    ISBN10: 1718501129

    Number of Pages: 216

    Non Fiction , Computing

    Description

    When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen? In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you ll explore the darker side of Python s capabilities writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, and more. You ll learn how to: Create a trojan command-and-control using GitHub Detect sandboxing and automate comèmon malware tasks, like keylogging and screenshotting Escalate Windows privileges with creative process control Use offensive memory forensics tricks to retrieve password hashes and inject shellcode into a virtual machine Extend the popular Burp Suite web-hacking tool Abuse Windows COM automation to perform a man-in-the-browser attack Exfiltrate data from a network most sneakily Insider techniques and creative challenges throughout show you how to extend th

    Customer Reviews

    Be the first to write a review
    0%
    (0)
    0%
    (0)
    0%
    (0)
    0%
    (0)
    0%
    (0)

    Recently viewed products

    © 2024 Book Curl,

      • American Express
      • Apple Pay
      • Diners Club
      • Discover
      • Google Pay
      • Maestro
      • Mastercard
      • PayPal
      • Shop Pay
      • Union Pay
      • Visa

      Login

      Forgot your password?

      Don't have an account yet?
      Create account