Black Hat Python: Python Programming for Hackers and Pentesters - Info and Reading Options
By Justin Seitz and Tim Arnold

"Black Hat Python: Python Programming for Hackers and Pentesters" is published by No Starch Press in Dec 21, 2014 - San Francisco and it has 192 pages.
“Black Hat Python: Python Programming for Hackers and Pentesters” Metadata:
- Title: ➤ Black Hat Python: Python Programming for Hackers and Pentesters
- Authors: Justin SeitzTim Arnold
- Number of Pages: 192
- Publisher: No Starch Press
- Publish Date: Dec 21, 2014
- Publish Location: San Francisco
“Black Hat Python: Python Programming for Hackers and Pentesters” Subjects and Themes:
- Subjects: ➤ Python (Computer program language) - Computer security - Python (język programowania) - Sieci komputerowe - Dostęp - Kontrola - Komputery
Edition Identifiers:
- The Open Library ID: OL26837925M - OL19547345W
- Online Computer Library Center (OCLC) ID: 880566746 - 900086572
- Library of Congress Control Number (LCCN): 2014953241
- ISBN-13: 9781593275907
- ISBN-10: 1593275900
- All ISBNs: 1593275900 - 9781593275907
AI-generated Review of “Black Hat Python: Python Programming for Hackers and Pentesters”:
"Black Hat Python: Python Programming for Hackers and Pentesters" Table Of Contents:
- 1- Foreword
- 2- Preface
- 3- Acknowledgments
- 4- Setting Up Your Python Environment
- 5- Installing Kali Linux
- 6- WingIDE
- 7- The Network: Basics
- 8- Python Networking in a Paragraph
- 9- TCP Client
- 10- UDP Client
- 11- TCP Server
- 12- Replacing Netcat
- 13- Kicking the Tires
- 14- Building a TCP Proxy
- 15- Kicking the Tires
- 16- SSH with Paramiko
- 17- Kicking the Tires
- 18- SSH Tunneling
- 19- Kicking the Tires
- 20- The Network: Raw Sockets and Sniffing
- 21- Building a UDP Host Discovery Tool
- 22- Packet Sniffing on Windows and Linux
- 23- Kicking the Tires
- 24- Decoding the IP Layer
- 25- Kicking the Tires
- 26- Decoding ICMP
- 27- Kicking the Tires
- 28- Owning the Network with Scapy
- 29- Stealing Email Credentials
- 30- Kicking the Tires
- 31- ARP Cache Poisoning with Scapy
- 32- Kicking the Tires
- 33- PCAP Processing
- 34- Kicking the Tires
- 35- Web Hackery
- 36- The Socket Library of the Web: urllib2
- 37- Mapping Open Source Web App Installations
- 38- Kicking the Tires
- 39- Brute-Forcing Directories and File Locations
- 40- Kicking the Tires
- 41- Brute-Forcing HTML Form Authentication
- 42- Kicking the Tires
- 43- Extending Burp Proxy
- 44- Setting Up
- 45- Burp Fuzzing
- 46- Kicking the Tires
- 47- Bing for Burp
- 48- Kicking the Tires
- 49- Turning Website Content into Password Gold
- 50- Kicking the Tires
- 51- GitHub Command and Control
- 52- Setting Up a GitHub Account
- 53- Creating Modules
- 54- Trojan Configuration
- 55- Building a GitHub-Aware Trojan
- 56- Hacking Python's Import Functionality
- 57- Kicking the Tires
- 58- Common Trojanning Tasks on Windows
- 59- Keylogging for Fun and Keystrokes
- 60- Kicking the Tires
- 61- Taking Screenshots
- 62- Pythonic Shellcode Execution
- 63- Kicking the Tires
- 64- Sandbox Detection
- 65- Fun with Internet Explorer
- 66- Man-in-the-Browser (Kind Of)
- 67- Creating the Server
- 68- Kicking the Tires
- 69- IE COM Automation for Exfiltration
- 70- Kicking the Tires
- 71- Windows Privilege Escalation
- 72- Installing the Prerequisites
- 73- Creating a Process Monitor
- 74- Process Monitoring with WMI
- 75- Kicking the Tires
- 76- Windows Token Privileges
- 77- Winning the Race
- 78- Kicking the Tires
- 79- Code Injection
- 80- Kicking the Tires
- 81- Automating Offensive Forensics
- 82- Installation
- 83- Profiles
- 84- Grabbing Password Hashes
- 85- Direct Code Injection
- 86- Kicking the Tires
- 87- Index
"Black Hat Python: Python Programming for Hackers and Pentesters" Description:
Open Data:
Python is the high-level language of choice for hackers and software security analysts because it makes it easy to write powerful and effective security tools. A follow-up to the perennial best-seller Gray Hat Python (2011), the all-new Black Hat Python explores the darker side of Python's capabilities - writing network sniffers, manipulating packets, web hacking, infecting virtual machines, creating stealthy trojans, extending the popular web hacking tool Burp Suite, and more. By showing how carefully crafted code can be used to disrupt and disable a system, Black Hat Python will help you test your systems and improve your security posture. Insider techniques and creative challenges show you how to extend the hacks, and are sure to make Black Hat Python irresistible to anyone interested in offensive security
Read “Black Hat Python: Python Programming for Hackers and Pentesters”:
Read “Black Hat Python: Python Programming for Hackers and Pentesters” by choosing from the options below.
Search for “Black Hat Python: Python Programming for Hackers and Pentesters” downloads:
Visit our Downloads Search page to see if downloads are available.
Borrow "Black Hat Python: Python Programming for Hackers and Pentesters" Online:
Check on the availability of online borrowing. Please note that online borrowing has copyright-based limitations and that the quality of ebooks may vary.
- Is Online Borrowing Available: Yes
- Preview Status: borrow
- Check if available: The Open Library & The Internet Archive
Find “Black Hat Python: Python Programming for Hackers and Pentesters” in Libraries Near You:
Read or borrow “Black Hat Python: Python Programming for Hackers and Pentesters” from your local library.
- The WorldCat Libraries Catalog: Find a copy of “Black Hat Python: Python Programming for Hackers and Pentesters” at a library near you.
Buy “Black Hat Python: Python Programming for Hackers and Pentesters” online:
Shop for “Black Hat Python: Python Programming for Hackers and Pentesters” on popular online marketplaces.
- Ebay: New and used books.