When it comes to creating powerful and effec- tive hacking tools, Python is the language of


Download 6.5 Mb.
Pdf ko'rish
bet3/17
Sana20.10.2023
Hajmi6.5 Mb.
#1712575
1   2   3   4   5   6   7   8   9   ...   17
Bog'liq
Black Hat Python-1st Edition

about the author
Justin Seitz is a senior security researcher for Immunity, Inc., where he 
spends his time bug hunting, reverse engineering, writing exploits, and 
coding Python. He is the author of Gray Hat Python, the first book to cover 
Python for security analysis.
about the technical Reviewers
Dan Frisch has over ten years of experience in information security. 
Currently, he is a senior security analyst in a Canadian law enforcement 
agency. Prior to that role, he worked as a consultant providing security 
assessments to financial and technology firms in North America. Because 
he is obsessed with technology and holds a 3rd degree black belt, you can 
assume (correctly) that his entire life is based around The Matrix.
Since the early days of Commodore PET and VIC-20, technology has been 
a constant companion (and sometimes an obsession!) to Cliff Janzen. Cliff 
discovered his career passion when he moved to information security in 
2008 after a decade of IT operations. For the past few years Cliff has been 
happily employed as a security consultant, doing everything from policy 
review to penetration tests, and he feels lucky to have a career that is also 
his favorite hobby.
www.it-ebooks.info


www.it-ebooks.info


B r i e f c o n t e n t s
Foreword by Charlie Miller . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xvii
Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xix
Chapter 1: Setting Up Your Python Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Chapter 2: The Network: Basics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Chapter 3: The Network: Raw Sockets and Sniffing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Chapter 4: Owning the Network with Scapy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Chapter 5: Web Hackery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Chapter 6: Extending Burp Proxy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Chapter 7: GitHub Command and Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
Chapter 8: Common Trojaning Tasks on Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
Chapter 9: Fun with Internet Explorer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
Chapter 10: Windows Privilege Escalation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
Chapter 11: Automating Offensive Forensics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
www.it-ebooks.info


www.it-ebooks.info



Download 6.5 Mb.

Do'stlaringiz bilan baham:
1   2   3   4   5   6   7   8   9   ...   17




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling