<b>Fully-updated, second edition of this worldwide bestseller with over 100,000 copies sold.</b> When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. In <i>Black Hat Python</i>, you'll explore the darker side of Python's capa
Black Hat Python: Python Programming for Hackers and Pentesters
✍ Scribed by Justin Seitz
- Publisher
- No Starch Press
- Year
- 2014
- Tongue
- English
- Leaves
- 195
- Category
- Library
No coin nor oath required. For personal study only.
✦ Synopsis
When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen? In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you’ll explore the darker side of Python’s capabilities—writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, and more. You’ll learn how to: –Create a trojan command-and-control using GitHub –Detect sandboxing and automate common malware tasks, like keylogging and screenshotting –Escalate Windows privileges with creative process control –Use offensive memory forensics tricks to retrieve password hashes and inject shellcode into a virtual machine –Extend the popular Burp Suite web-hacking tool –Abuse Windows COM automation to perform a man-in-the-browser attack –Exfiltrate data from a network most sneakily Insider techniques and creative challenges throughout show you how to extend the hacks and how to write your own exploits. When it comes to offensive security, your ability to create powerful tools on the fly is indispensable. Learn how in Black Hat Python. Uses Python 2
✦ Table of Contents
About the Author
Brief Contents
Contents in Detail
Foreword
Preface
Acknowledgments
Chapter 1: Setting Up Your Python Environment
Installing Kali Linux
WingIDE
Chapter 2: The Network: Basics
Python Networking in a Paragraph
TCP Client
UDP Client
TCP Server
Replacing Netcat
Kicking the Tires
Building a TCP Proxy
Kicking the Tires
SSH with Paramiko
Kicking the Tires
SSH Tunneling
Kicking the Tires
Chapter 3: The Network:
Raw Sockets and Sniffing
Building a UDP Host Discovery Tool
Packet Sniffing on Windows and Linux
Kicking the Tires
Decoding the IP Layer
Kicking the Tires
Decoding ICMP
Kicking the Tires
Chapter 4: Owning the Network with Scapy
Stealing Email Credentials
Kicking the Tires
ARP Cache Poisoning with Scapy
Kicking the Tires
PCAP Processing
Kicking the Tires
Chapter 5: Web Hackery
The Socket Library of the Web: urllib2
Mapping Open Source Web App Installations
Kicking the Tires
Brute-Forcing Directories and File Locations
Kicking the Tires
Brute-Forcing HTML Form Authentication
Kicking the Tires
Chapter 6: Extending Burp Proxy
Setting Up
Burp Fuzzing
Kicking the Tires
Bing for Burp
Kicking the Tires
Turning Website Content into Password Gold
Kicking the Tires
Chapter 7: GitHub Command and Control
Setting Up a GitHub Account
Creating Modules
Trojan Configuration
Building a GitHub-Aware Trojan
Hacking Python’s import Functionality
Kicking the Tires
Chapter 8: Common Trojaning Tasks on Windows
Keylogging for Fun and Keystrokes
Kicking the Tires
Taking Screenshots
Pythonic Shellcode Execution
Kicking the Tires
Sandbox Detection
Chapter 9: Fun with Internet Explorer
Man-in-the-Browser (Kind Of)
Creating the Server
Kicking the Tires
IE COM Automation for Exfiltration
Kicking the Tires
Chapter 10: Windows Privilege Escalation
Installing the Prerequisites
Creating a Process Monitor
Process Monitoring with WMI
Kicking the Tires
Windows Token Privileges
Winning the Race
Kicking the Tires
Code Injection
Kicking the Tires
Chapter 11: Automating Offensive Forensics
Installation
Profiles
Grabbing Password Hashes
Direct Code Injection
Kicking the Tires
Index
Updates
📜 SIMILAR VOLUMES
When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen?<br><br>In <i>Black Hat Python</i>, the latest from Justin Seitz (author of the best-selling <i>Gray Hat Python</i>), you’ll explore the dar
When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. Seitz explores the darker side of Python's capabilities--writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, and more. Reade
<p><i>Black Hat Python</i> explores the darker side of Pythons capabilities, helping you test your systems and improve your security posture.</p>
When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen?<br /><br />In<i>Black Hat Python</i>, the latest from Justin Seitz (author of the best-selling<i>Gray Hat Python</i>), you'll explore the d