Black Hat Python: Python Programming for Hackers and Pentesters 1st Edition
by
Justin Seitz
(Author)
| Justin Seitz (Author) Find all the books, read about the author, and more. See search results for this author |
Related Text
ISBN-13: 978-1593275907
ISBN-10: 1593275900
Why is ISBN important? ISBN
Scan an ISBN with your phone
Use the Amazon App to scan ISBNs and compare prices.
This bar-code number lets you verify that you're getting exactly the right version or edition of a book. The 13-digit and 10-digit formats both work.
Use the Amazon App to scan ISBNs and compare prices.
Add to book club
Loading your book clubs
There was a problem loading your book clubs. Please try again.
Not in a club? Learn more
Join or create book clubs
Choose books together
Track your books
Bring your club to Amazon Book Clubs, start a new book club and invite your friends to join, or find a club that’s right for you for free.
In Stock.
Ships from and sold by Amazon.com.
More Buying Choices
There is a newer edition of this item:
When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen?
In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you’ll explore the darker side of Python’s capabilities—writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, and more.
You’ll learn how to:
–Create a trojan command-and-control using GitHub
–Detect sandboxing and automate common malware tasks, like keylogging and screenshotting
–Escalate Windows privileges with creative process control
–Use offensive memory forensics tricks to retrieve password hashes and inject shellcode into a virtual machine
–Extend the popular Burp Suite web-hacking tool
–Abuse Windows COM automation to perform a man-in-the-browser attack
–Exfiltrate data from a network most sneakily
Insider techniques and creative challenges throughout show you how to extend the hacks and how to write your own exploits.
When it comes to offensive security, your ability to create powerful tools on the fly is indispensable. Learn how in Black Hat Python.
Uses Python 2
In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you’ll explore the darker side of Python’s capabilities—writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, and more.
You’ll learn how to:
–Create a trojan command-and-control using GitHub
–Detect sandboxing and automate common malware tasks, like keylogging and screenshotting
–Escalate Windows privileges with creative process control
–Use offensive memory forensics tricks to retrieve password hashes and inject shellcode into a virtual machine
–Extend the popular Burp Suite web-hacking tool
–Abuse Windows COM automation to perform a man-in-the-browser attack
–Exfiltrate data from a network most sneakily
Insider techniques and creative challenges throughout show you how to extend the hacks and how to write your own exploits.
When it comes to offensive security, your ability to create powerful tools on the fly is indispensable. Learn how in Black Hat Python.
Uses Python 2
Customers who viewed this item also viewed
Page 1 of 1 Start overPage 1 of 1
From the Publisher
Editorial Reviews
Review
"Whether you're interested in becoming a serious hacker/penetration tester or just want to know how they work, this book is one you need to read. Intense, technically sound, and eye-opening."
<—Computerworld
"Black Hat Python is an excellent way to start by fully investigating how the language can be used for both the light – and dark – sides of hacking."
<—ZDNet
<—Computerworld
"Black Hat Python is an excellent way to start by fully investigating how the language can be used for both the light – and dark – sides of hacking."
<—ZDNet
About the Author
Justin Seitz is a senior security researcher for Immunity, Inc., where he spends his time bug hunting, reverse engineering, writing exploits, and coding Python. He is the author of Gray Hat Python (No Starch Press), the first book to cover Python for security analysis.
Tell the Publisher!
I'd like to read this book on Kindle
Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.
I'd like to read this book on Kindle
Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.
Product details
- Publisher : No Starch Press; 1st edition (December 21, 2014)
- Language : English
- Paperback : 192 pages
- ISBN-10 : 1593275900
- ISBN-13 : 978-1593275907
- Item Weight : 15.2 ounces
- Dimensions : 6.94 x 0.51 x 9.25 inches
- Best Sellers Rank: #90,569 in Books (See Top 100 in Books)
- #29 in Computer Viruses
- #73 in Privacy & Online Safety
- #84 in Computer Networking (Books)
- Customer Reviews:
About the author
Follow authors to get new release updates, plus improved recommendations.

Discover more of the author’s books, see similar authors, read author blogs and more
Customer reviews
4.6 out of 5 stars
4.6 out of 5
460 global ratings
How customer reviews and ratings work
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on Amazon
5.0 out of 5 stars
and one of my favorite technical guides of all
Reviewed in the United States on January 22, 2016
Not a comprehensive Python style guide or dictionary. Just a few things that you would want to know how to do specifically for pentesting and post exploitation work. An absolutely phenomenal place for red teamers to start with Python, and one of my favorite technical guides of all time
Reviewed in the United States on January 22, 2016
Images in this review
Top reviews
Top reviews from the United States
There was a problem filtering reviews right now. Please try again later.
Reviewed in the United States on July 20, 2017
Wish was written in Python 3 instead of 2
51 people found this helpful
Report abuse
Reviewed in the United States on July 13, 2019
Great book, I was nervous about python 2 to 3 etc... But python 3 uses most if not all the python 2 libraries now. So the only difference is really the print statement. Not worth worrying about. Complements the gray hat one.
18 people found this helpful
Report abuse
Reviewed in the United States on September 13, 2020
I use this as a supplemental text in both my undergraduate systems programming course and in my advanced graduate class in data security. In the undergraduate class it lets the students practice their python and see some of network programming without getting lost in all the structs and pointers of the C language API. (Python neatly wraps the system calls, then once the students are more comfortable with C we look at those). In the advanced class, seeing how tools like nmap, netcat, and wget can be emulated with a python program is very informative. Especially when we use it to get around software installation restrictions imposed by the i****ts at the university.
One person found this helpful
Report abuse
5.0 out of 5 stars
This is a pretty advanced manual, don't expect to jump into it if you're new to programming/Python
Reviewed in the United States on August 2, 2018
Item as described, no defects or issues. Definitely satisfied.
10 people found this helpful
Report abuse
Reviewed in the United States on April 11, 2019
I’m just learning to script in python and learning to Ethically Hack so this is kinda killing two birds with one stone for me
5 people found this helpful
Report abuse
Reviewed in the United States on April 6, 2018
Good book, but I wish it had options for current release of python.
8 people found this helpful
Report abuse
Reviewed in the United States on April 17, 2018
So far an excellent book on basic hacking using Python. I've been using Perl for many years
for security work so I bought this to as a fun way to start using Python and learn some new tricks.
for security work so I bought this to as a fun way to start using Python and learn some new tricks.
5 people found this helpful
Report abuse
Reviewed in the United States on October 16, 2019
Sinister book. Not hard to convert python 2 to 3
One person found this helpful
Report abuse
Top reviews from other countries
Liquid
3.0 out of 5 stars
Great book but.......
Reviewed in the United Kingdom on September 10, 2018
Like I said it's a great book if you are moderate to higher in your python exposure, a beginner can use it if your good a grasping new concepts quickly. the book is very good if you want to learn the "darker" side of scripting, but the only catch really is the book is out-dated and needs a volume 2 with all of the python and kali updates included. Its because if you try and set up your environment now to how the book explains you will have a pretty confusing time (Especially if you're still green). There have been a number of Kali Linux updates that have changed a number of thing on how the OS functions plus Python is in the third iteration and the book is written for 2.3 (please don't quote this, but I'm sure it is that) so some of the code in the book doesn't work. also for a side note; some of the atttact vectors that the book gives you may have been patched. But please understand that this is a good book if you need some reference material, and again don't be swayed but my criticisms, this is a good book which can teach you some fun things to try.
7 people found this helpful
Report abuse
Adham
3.0 out of 5 stars
The worst thing about it it was python 2
Reviewed in the United Kingdom on January 27, 2021
The worst thing about it it was python 2
ZzZNetworks
5.0 out of 5 stars
Python2
Reviewed in the United Kingdom on May 9, 2019
Had this for a few months. I have to say im very impressed with the content in the book. Its python2 but it's not hard to re write the code In python3 after learning.
ZzZNetworks
Reviewed in the United Kingdom on May 9, 2019
Images in this review
One person found this helpful
Report abuse
Vladimir Bunic
5.0 out of 5 stars
Outsnanding book
Reviewed in the United Kingdom on March 10, 2021
All practical written and jus as I wanted.
Daniel Collyer
5.0 out of 5 stars
easy to follow programming guide
Reviewed in the United Kingdom on September 21, 2017
I am very happy










