Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Black Hat Python: Python Programming for Hackers and Pentesters

Buy

When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen?

In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you'll explore the darker side of Python's capabilities—writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, and more. You'll learn how to:

  • Create a trojan command-and-control using GitHub
  • Detect sandboxing and automate common malware tasks, like keylogging and screenshotting
  • Escalate Windows privileges with creative process control
  • Use offensive memory forensics tricks to retrieve password hashes and inject shellcode into a virtual machine
  • Extend the popular Burp Suite web-hacking tool
  • Abuse Windows COM automation to perform a man-in-the-browser attack
  • Exfiltrate data from a network most sneakily
Insider techniques and creative challenges throughout show you how to extend the hacks and how to write your own exploits.

When it comes to offensive security, your ability to create powerful tools on the fly is indispensable. Learn how in Black Hat Python.

(HTML tags aren't allowed.)

Building And Integrating Virtual Private Networks With Openswan
Building And Integrating Virtual Private Networks With Openswan
With the widespread use of wireless networking and the integration of VPN capabilities in most
modern laptops, PDAs, and even cellular phones, there is a growing desire for encrypting more
and more communications to prevent eavesdropping. Can you trust the coffee shop's wireless
network? Is your neighbor snooping on your WiFi
...
Human - Computer Systems Interaction: Backgrounds and Applications 2: Part 1
Human - Computer Systems Interaction: Backgrounds and Applications 2: Part 1
A new procedure for combined validation of learning models – built for specifically uncertain data – is briefly described. The procedure, called the queue validation, relies on a combination of resubstitution with the modified learn-andtest paradigm. In the initial experiment [Burda and Hippe 2010] the developed...
SAP HANA Administration (HANA Admin) (SAP PRESS)
SAP HANA Administration (HANA Admin) (SAP PRESS)

Who says that a leopard can't change its spots? With the advent of SAP HANA, database administration is evolving and you can evolve along with it.

Learn how traditional administration concepts are applied in SAP HANA, and find out about the new concepts relevant to an in-memory database. 
Novice or expert, this book...

The Definitive Guide to Linux Network Programming (Expert's Voice)
The Definitive Guide to Linux Network Programming (Expert's Voice)

This book is…one nice and convenient package that I will keep on the shelf as a reference manual.

The Definitive Guide to Linux Network Programming offers a clear, concise treatment of creating clients and servers under the Linux operating system. This book assumes that you know C and have experience developing code on...

In Silico: 3D Animation and Simulation of Cell Biology with Maya and MEL (The Morgan Kaufmann Series in Computer Graphics)
In Silico: 3D Animation and Simulation of Cell Biology with Maya and MEL (The Morgan Kaufmann Series in Computer Graphics)
In Silico introduces Maya programming into one of the most fascinating application areas of 3D graphics: biological visualization. In five building-block tutorials, this book prepares animators to work with visualization problems in cell biology. The book assumes no deep knowledge of cell biology nor 3D graphics programming. An...
IBM Xseries 455 Planning And Installation Guide
IBM Xseries 455 Planning And Installation Guide
The IBM eServer xSeries 455 is the second-generation Enterprise X-Architecture server using the 64-bit IBM XA-64 chipset and the Intel Itanium 2 processor. Unlike the x450, its predecessor, the x455 supports the merging of four server chassis to form a single 16-way image, providing even greater expandability and investment protection.
...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy