Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Black Hat Python: Python Programming for Hackers and Pentesters

Buy

When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen?

In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you'll explore the darker side of Python's capabilities—writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, and more. You'll learn how to:

  • Create a trojan command-and-control using GitHub
  • Detect sandboxing and automate common malware tasks, like keylogging and screenshotting
  • Escalate Windows privileges with creative process control
  • Use offensive memory forensics tricks to retrieve password hashes and inject shellcode into a virtual machine
  • Extend the popular Burp Suite web-hacking tool
  • Abuse Windows COM automation to perform a man-in-the-browser attack
  • Exfiltrate data from a network most sneakily
Insider techniques and creative challenges throughout show you how to extend the hacks and how to write your own exploits.

When it comes to offensive security, your ability to create powerful tools on the fly is indispensable. Learn how in Black Hat Python.

(HTML tags aren't allowed.)

Deploying IPv6 Networks
Deploying IPv6 Networks

An essential guide to IPv6 concepts, service implementation, and interoperability in existing IPv4 environments.

  • Learn about IPv6 services and the relevant IPv6 features that make them possible

  • Plan, deploy, and manage IPv6 services at...

Developments in Speech Synthesis
Developments in Speech Synthesis
Contemporary speech synthesis is perceived as inadequate for general adoption for user interaction, largely because it rests on an inadequate model of human speech production and perception. This book reviews the underlying model, brings out areas of inadequacy and suggests how improvements might be made. It is argued that a greater understanding...
Shell Scripting Recipes: A Problem-Solution Approach (Expert's Voice in Open Source)
Shell Scripting Recipes: A Problem-Solution Approach (Expert's Voice in Open Source)

In today’s IT environment, harried system administrators are finding themselves more overworked than ever. This book helps them regain some of the lost time spent creating and testing shell scripts, and guides readers through more than 150 much-needed and practical real-world examples.

Because all scripts found in this book are...


Business Writing for Results : How to Create a Sense of Urgency and Increase Response to All of Your Business Communications
Business Writing for Results : How to Create a Sense of Urgency and Increase Response to All of Your Business Communications
Malcolm Forbes once said, “A good business letter can get you a job interview, get you off the hook, or get you money. It’s totally asinine to blow your chances of getting whatever you want with a business letter that turns people off instead of turning them on.”

Here’s the bottom line: If you can’t produce
...
Detecting Lies and Deceit: Pitfalls and Opportunities (Wiley Series in Psychology of Crime, Policing and Law)
Detecting Lies and Deceit: Pitfalls and Opportunities (Wiley Series in Psychology of Crime, Policing and Law)

Why do people lie?

Do gender and personality differences affect how people lie?

How can lies be detected?

Detecting Lies and Deceit provides the most comprehensive review of deception to date. This revised edition provides an up-to-date...

Job Interviews For Dummies (Career/Education)
Job Interviews For Dummies (Career/Education)
Job interviews are crucial meetings that seal the deal on who gets hired. But, since the previous edition of Job Interviews for Dummies was published, everything about the interview process has changed in ways you need to know about and get comfortable with beforehand.

This completely revised and updated 3rd Edition...

©2018 LearnIT (support@pdfchm.net) - Privacy Policy