Description
Book Synopsis: Fully-updated for Python 3, the second edition of this worldwide bestseller (over 100,000 copies sold) explores the stealthier side of programming and brings you all new strategies for your hacking projects.
When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. In this second edition of the bestselling Black Hat Python, you’ll explore the darker side of Python’s capabilities: everything from writing network sniffers, stealing email credentials, and bruteforcing directories to crafting mutation fuzzers, investigating virtual machines, and creating stealthy trojans. All of the code in this edition has been updated to Python 3.x.
You’ll also find new coverage of bit shifting, code hygiene, and offensive forensics with the Volatility Framework as well as expanded explanations of the Python libraries ctypes, struct, lxml, and BeautifulSoup, and offensive hacking strategies like splitting bytes, leveraging computer vision libraries, and scraping websites.
You’ll even learn how to:
- Create a trojan command-and-control server using GitHub
- Detect sandboxing and automate common malware tasks like keylogging and screenshotting
- Extend the Burp Suite web-hacking tool
- Escalate Windows privileges with creative process control
- Use offensive memory forensics tricks to retrieve password hashes and find vulnerabilities on a virtual machine
- Abuse Windows COM automation
- Exfiltrate data from a network undetected
When it comes to offensive security, you need to be able to create powerful tools on the fly. Learn how with Black Hat Python.
Details
Unlock the secrets of hacking with Black Hat Python, 2nd Edition! Designed specifically for hackers and pentesters, this comprehensive guide is a must-have for anyone seeking to master Python programming in the field. With its in-depth coverage of advanced techniques and real-world examples, you'll gain the knowledge and skills necessary to take your cybersecurity game to the next level.
Discover the power of Python when it comes to hacking and penetration testing. Whether you're a beginner or an experienced programmer, the second edition of Black Hat Python will equip you with the tools and insights needed to target vulnerabilities, exploit systems, and secure your own networks. Stay one step ahead of potential threats and outsmart the hackers with the power of Python programming.
Why settle for less when you can have the best? Black Hat Python, 2nd Edition offers unrivaled expertise and insider knowledge from leading cybersecurity experts. Learn the intricate details of network protocols, manipulate packets, and dive into the world of reverse engineering using Python. This book is your gateway to becoming a proficient hacker – motivated by ethical hacking practices and driven to protect yourself and others.
Ready to dive into the exciting world of hacking and pentesting? Get your copy of Black Hat Python, 2nd Edition now and take your Python programming skills to new heights. Whether you're an aspiring hacker or a cybersecurity professional looking to expand your skillset, this book is your ultimate resource. Don't miss out on this opportunity to become a master of Python and secure the digital landscape. Click here to start your hacking journey today!
Discover More Best Sellers in Computers & Technology
Shop Computers & Technology
Eloquent JavaScript, 3rd Edition: A Modern Introduction to Programming
Computers & Technology - Eloquent JavaScript, 3rd Edition: A Modern Introduction to Programming
Glossy: Ambition, Beauty, and the Inside Story of Emily Weiss's Glossier
Computers & Technology - Glossy: Ambition, Beauty, and the Inside Story of Emily Weiss's Glossier
CompTIA CySA+ Study Guide: Exam CS0-003 (Sybex Study Guide)
Computers & Technology - CompTIA CySA+ Study Guide: Exam CS0-003 (Sybex Study Guide)
Accelerate: Building and Scaling High Performing Technology Organizations
Computers & Technology - Accelerate: Building and Scaling High Performing Technology Organizations
Easy Money: Cryptocurrency, Casino Capitalism, and the Golden Age of Fraud
Computers & Technology - Easy Money: Cryptocurrency, Casino Capitalism, and the Golden Age of Fraud
Computers & Technology - Password Book: Personal Internet and Password Keeper and Organizer for Usernames, Logins and Web Addresses. Suitable for Home and Office (Alphabetically sorted)
Dotcom Secrets: The Underground Playbook for Growing Your Company Online with Sales Funnels
Computers & Technology - Dotcom Secrets: The Underground Playbook for Growing Your Company Online with Sales Funnels
Metaphor: ReFantazio Official Strategy Guide
Computers & Technology - Metaphor: ReFantazio Official Strategy Guide


