[PDF] Black Hat Python: Python Programming for Hackers and Pentesters

ISBN: 1593275900

Category: Tutorial


Posted on 2017-12-14, by luongquocchinh.

Description



Author: Justin Seitz | Category: Programming | Language: English | Page: 192 | ISBN: 1593275900 | ISBN13: 9781593275907 |

Description: Python is the language of choice for hackers and security analysts for creating powerful and effective tools. Ever wonder how they do it? A follow-up to the perennial best-seller Gray Hat Python, Justin Seitz's Black Hat Python explores the darker side of Python's capabilities—writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, extending the popular web hacking tool Burp Suite, and more. You'll learn how to: Create a trojan command-and-control using Github Detect sandboxing and automate common malware tasks, like keylogging and screenshotting Escalate Windows privileges with creative process control Use offensive memory forensics tricks to retrieve password hashes and inject shellcode into a virtual machine Abuse Windows COM automation to perform a man-in-the-browser attack Exfiltrate data from a network most sneakily Insider techniques and creative challenges show you how to extend the hacks, and are sure to make Black Hat Python irresistible to anyone interested in offensive security.

DOWNLOADDownload this book
Black Hat Python: Python Programming for Hackers and Pentesters.pdf
http://uploaded.net/file/m7nzeufw

Sponsored High Speed Downloads
7659 dl's @ 2340 KB/s
Download Now [Full Version]
6171 dl's @ 3181 KB/s
Download Link 1 - Fast Download
8194 dl's @ 3409 KB/s
Download Mirror - Direct Download



Search More...
[PDF] Black Hat Python: Python Programming for Hackers and Pentesters

Search free ebooks in ebookee.com!


Links
Download this book

No active download links here?
Please check the description for download links if any or do a search to find alternative books.


Related Books


Comments

No comments for "[PDF] Black Hat Python: Python Programming for Hackers and Pentesters".


    Add Your Comments
    1. Download links and password may be in the description section, read description carefully!
    2. Do a search to find mirrors if no download links or dead links.
    Back to Top