000 | 02387cam a22003737i 4500 | ||
---|---|---|---|
001 | 18325983 | ||
005 | 20240310114604.0 | ||
008 | 141006t20212021caua f 001 0 eng d | ||
010 | _a 2014953241 | ||
020 | _a9781718501126 | ||
035 | _a(OCoLC)ocn880566746 | ||
035 | _a(Sirsi) a3082 | ||
040 |
_aYDXCP _beng _cYDXCP _erda _dOCLCQ _dBTCTA _dBDX _dOCLCQ _dB@L _dOCLCO _dCLE _dOCLCF _dDEBSZ _dDOV _dFJD _dNZAUC _dCDX _dDLC |
||
042 | _alccopycat | ||
050 | 0 | 0 |
_aQA76.9.A25 _bS456 2015 |
082 | 0 | 4 |
_a005.8 _223 |
100 | 1 |
_aSeitz, Justin _e, author _93443 |
|
245 | 1 | 0 |
_aBlack hat Python _b:Python programming for hackers and pentesters _c\ by Justin Seitz, and Tim Arnold . |
246 | 3 | 0 | _aPython programming for hackers and pentesters |
250 | _a2nd edition. | ||
264 | 1 |
_aSan Francisco _b:No Starch Press, _c[2021] |
|
264 | 4 | _c©2021 | |
300 |
_axviii, 190 pages : _billustrations; _c24 cm |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_aunmediated _bn _2rdamedia |
||
338 |
_avolume _bnc _2rdacarrier |
||
500 | _aIncludes index. | ||
505 | 0 | _aSetting up your Python environment -- The network: basics -- The network: raw sockets and sniffing -- Owning the network with scapy -- Web hackery -- Extending Burp proxy -- GITHUB command and control -- Common trojaning tasks on Windows -- Fun with Internet Explorer -- Windows privilege escalation -- Automating offensive forensics. | |
520 | _aPython is the high-level language of choice for hackers and software security analysts because it makes it easy to write powerful and effective security tools. A follow-up to the perennial best-seller Gray Hat Python (2011), the all-new Black Hat Python explores the darker side of Python's capabilities - writing network sniffers, manipulating packets, web hacking, infecting virtual machines, creating stealthy trojans, extending the popular web hacking tool Burp Suite, and more. By showing how carefully crafted code can be used to disrupt and disable a system, Black Hat Python will help you test your systems and improve your security posture. Insider techniques and creative challenges show you how to extend the hacks, and are sure to make Black Hat Python irresistible to anyone interested in offensive security. | ||
596 | _a1 3 | ||
650 | 0 |
_aComputer security. _91412 |
|
650 | 0 |
_aPython (Computer program language) _91138 |
|
700 | 1 |
_aArnold, Tim _e, author _93444 |
|
999 |
_c1044 _d1044 |