Fully-updated for Python 3, the second edition of this worldwide bestseller (over 100,000 copies sold) explores the stealthier side of programming and brings you all new strategies for your hacking projects.
When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. In this second edition of the bestselling Black Hat Python, you’ll explore the darker side of Python’s capabilities: everything from writing network sniffers, stealing email credentials, and bruteforcing directories to crafting mutation fuzzers, investigating virtual machines, and creating stealthy trojans.
All of the code in this edition has been updated to Python 3.x. You’ll also find new coverage of bit shifting, code hygiene, and offensive forensics with the Volatility Framework as well as expanded explanations of the Python libraries ctypes, struct, lxml, and BeautifulSoup, and offensive hacking strategies like splitting bytes, leveraging computer vision libraries, and scraping websites.
You’ll even learn how to:
- Create a trojan command-and-control server using GitHub
- Detect sandboxing and automate common malware tasks like keylogging and screenshotting
- Extend the Burp Suite web-hacking tool
- Escalate Windows privileges with creative process control
- Use offensive memory forensics tricks to retrieve password hashes and find vulnerabilities on a virtual machine
- Abuse Windows COM automation
- Exfiltrate data from a network undetected
When it comes to offensive security, you need to be able to create powerful tools on the fly. Learn how with Black Hat Python.
James –
Als pentester/ethical hacker en iemand die skilled is op het gebied van python of networking schiet dit boek niet tekort. Je kan zeker nuttige informatie vinden over het maken/gebruiken van de tools die nodig zijn.
panos_kanpanos_kan –
Great book !!
2 people found this helpful
Ethan –
Great buy
Great content and very informative, a great resource to add to your arsenal!
One person found this helpful
Seagull Stahpitnow –
Tough read for a newbie
To start off, I am not the world’s best at writing code. I do have a low level understanding of the concepts and can figure out (with a longer amount of time) how to get some of the code functional.With this in mind, this book (if your a beginner or struggle with Python) is going to be a tough read and hard to practice. Its pseudocode is solid and makes the coding easier but you need to beware of pythons syntax differences between the different versions when you are using this. (This is something I struggle with).I am beyond happy with this book, albeit there are typos and errors inside it but I think it’s solid for practice in this field.Coming from a nontechnical profession, having the concepts explained and taken out from theory into working practice helps understand the practical side of doing something like this.Despite being a tough read, i have the frame of mind that ethical hacking and program development is not for a total newbie and some experience is needed for maximum efficiency.Hope this helps!
Gabriel Angel –
Envio del pedido
Recibí el libro en tiempo y forma y con muy buen detalle de trazabilidad.
Trevikram –
I picked up this book and found it very potential in terms of knowledge it was offering.
One person found this helpful
Juan –
Great Book
Great book.
One person found this helpful
Jonas HT –
produto chegou certinho, veio rapido. ainda nao tive tempo de termina-lo
2 people found this helpful
Paul Wilson –
Arrived on time all good and from first skim it is exactly what I was wanting and is perfectly explained and well worth buying even to have if you are into python etc.. great it’s python3 as well
Tom –
Great read for students
Studying cybersecurity, I thought “Black Hat Python, 2nd Edition” by Justin Seitz and Tim Arnold was quite helpful. This book makes difficult ideas far simpler by combining theory with practical examples. The revised material maintains it current given the cybersecurity issues of today. The practical uses it goes over, such as scraping and sniffing, which are essential skills for anyone working in the field. Whether you’re brand-new or seasoned, the simple explanations make it easy to follow. Any student studying cybersecurity should not miss this book since it provides the ideal combination of knowledge and useful abilities through guided projects.
3 people found this helpful
Issiakha –
Très heureux de recevoir ce livre vraiment top
One person found this helpful
andrew –
Great book
Book was in near brand new condition for a used book. Postage was amazingly quick to malaysia. Great book for anyone wanting to learn and play with some of kali linux malicious features. For ethical purposes obviously.
6 people found this helpful
Alejandro Gutierrez –
Ninguno
Woodrow W. Pope –
Good one, very informative
Followed book on installing VirtualBax and Kali. Had problem instaling Kali.
6 people found this helpful
Pen Name –
Excellent
A hands-on book that shows you how to use Python for offensive cybersecurity. Unlike other resources that teach theory, this book is all about building tools for hacking. Code examples work well and are easy to follow. That being said, it’s an advanced book. A good background in networking and Python will make it a more enjoyable experience.
AAM –
A Comprehensive Guide to Python Programming for Ethical Hackers and Pentesters
Black Hat Python, 2nd Edition, is an invaluable resource that dives deep into Python programming techniques specifically tailored for ethical hackers and penetration testers. This comprehensive guide equips readers with the knowledge and tools necessary to understand and implement advanced cybersecurity concepts using the Python programming language.One of the standout features of Black Hat Python, 2nd Edition, is its focus on practicality. The book provides real-world examples and hands-on exercises that allow readers to apply the concepts learned to practical hacking scenarios. By following along with the provided code and step-by-step instructions, readers gain a deeper understanding of how Python can be leveraged for offensive security purposes.The book covers a wide range of topics, including network scanning, packet sniffing, exploiting vulnerabilities, building trojans, web hacking, and more. It explores various Python libraries and frameworks that are instrumental in performing these tasks effectively. The author, Justin Seitz, demonstrates a wealth of knowledge and presents complex topics in a manner that is accessible and engaging.Black Hat Python, 2nd Edition, places a strong emphasis on ethical hacking and responsible use of the techniques discussed. It highlights the importance of obtaining proper authorization and conducting assessments within legal boundaries. This approach ensures that readers develop a strong ethical framework while honing their technical skills.The book’s organization and structure are commendable. It gradually progresses from foundational Python programming concepts to more advanced topics, allowing beginners to follow along and grasp the material. Each chapter builds upon the previous ones, creating a cohesive learning experience.Seitz’s writing style is clear, concise, and engaging, making complex concepts easier to understand. The book strikes a good balance between theoretical explanations and practical demonstrations, ensuring that readers not only comprehend the underlying concepts but also know how to apply them effectively.One minor limitation is that due to the rapidly evolving nature of cybersecurity, some of the specific tools and techniques discussed in the book may become outdated over time. However, the foundational knowledge and programming skills gained through Black Hat Python, 2nd Edition, remain invaluable for adapting to new technologies and methodologies.In conclusion, Black Hat Python, 2nd Edition, is a highly recommended resource for aspiring ethical hackers, pentesters, and anyone interested in cybersecurity. With its practical approach, extensive coverage of Python hacking techniques, and emphasis on ethical use, this book equips readers with the necessary skills to navigate the world of offensive security effectively. Justin Seitz’s expertise and ability to explain complex topics make this book a must-have reference for anyone looking to strengthen their Python programming skills for cybersecurity purposes.
9 people found this helpful
Felipe Leoncio NunesFelipe Leoncio Nunes –
O autor apresenta ferramentas úteis no dia a dia de um pentester/hacker. Me senti inspirado em criar minhas próprias ferramentas, e as que o livro contém são bem interessantes. Cada bloco de código é devidamente explicado através de índices. Leitores com conhecimentos em Python chegando ao intermediário, e o básico em redes, conseguem aproveitar o conteúdo sem complicações.
9 people found this helpful
Ash –
Luckily I learnt a lot of python concepts first. Obviously you can’t exactly jump into this topic with zero knowledge – good luck if you do. But awesome book!
The Buddha –
Must have some if not alot of experience prior to trying these out
Love the flow of the chapters. Most is still next level hacking…. but the book is great
3 people found this helpful
Harold Dcruz –
book is fine