- Paperback: 232 pages
- Publisher: No Starch Press; 1 edition (May 3, 2009)
- Language: English
- ISBN-10: 1593271921
- ISBN-13: 978-1593271923
- Product Dimensions: 7 x 0.9 x 9 inches
- Shipping Weight: 14.4 ounces (View shipping rates and policies)
- Average Customer Review: 3.9 out of 5 stars See all reviews (34 customer reviews)
- Amazon Best Sellers Rank: #146,379 in Books (See Top 100 in Books)
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
Gray Hat Python: Python Programming for Hackers and Reverse Engineers 1st Edition
Use the Amazon App to scan ISBNs and compare prices.
Frequently Bought Together
About the Author
Justin Seitz is a Senior Security Researcher for Immunity, Inc., where he spends his time bug hunting, reverse engineering, writing exploits, and coding Python.
From the Publisher
|Automate the Boring Stuff with Python||Python Crash Course||Doing Math with Python||Black Hat Python||Python Playground||Gray Hat Python|
|User Experience Level||Beginners||Beginners||Readers who know Python basics||Intermediate||Experienced||Experienced|
|For readers who want to…||Use Python to automate tedious computer tasks||Get a fast-paced, thorough introduction to Python and create three substantial projects from scratch||Delve into high school-level math topics using Python||Write Python-based offensive security tools on the fly||Explore Python’s versatility with imaginative programming projects||Automate security tasks, discover vulnerabilities, and write their own hacking tools|
|Tools Covered||Regular Expressions, Requests, Beautiful Soup, OpenPyXL, PyPDF2, PyAutoGUI||PyGame, matplotlib, Pygal, Django||matplotlib, SymPy||Scapy, openCV, BurpSuite, ctypes, Paramiko, urllib2||matplotlib, Numpy, OpenGL, Pillow, Arduino, Raspberry Pi||PyDBG, Immunity Debugger, Sulley, IDA Python, PyEMU, PyDev, ctypes|
|Compatible with Python Version||Python 3||Python 2 & 3||Python 3||Python 2||Python 2 & 3||Python 2|
|Page Count||504 pp.||560 pp.||264 pp.||192 pp.||352 pp.||216 pp.|
Top Customer Reviews
While there were a few merits in the book the majority of the book was a futile attempt to put outdated or useless information to paper. Many of my coworkers were very interested in the publication, but having read it and having spoken with my collegues that have read it we can all agree that it falls well short of anticipation.
The first five chapters were about Immunity Debugger. While reading them it seemed as if it were a sales pitch and then after reading that the author was employed by the same company that produces Immunity it was plainly obvious that he was influenced.
The author spent a chapter on hooking(6), DLL and code injection(7), fuzzing(8), Sulley(9), Fuzzing Windows Drivers(10), IDAPython(11), PyEMU(12) and obviously the Immunity Debugger chapters that were 1 through 5. But where was the rest? It was obviously lacking in many areas. There was very little mentioned on networks, packet reassembly or capture (pynids). No mention was made of Scapy, Pcapy, Impacket, Inguma, Volatility and so many more. Libraries that would be extremely helpful were never even brushed. IronPython, Win32, CryptoPy,
The examples given were poor to say the least. The author never mentioned which versions of python that the examples worked with and they were built using the older releases.Read more ›
Justin does a great job elaborating through the the code examples used throughout the book. The sheer scope of this book makes it difficult to cover everything but Justin definitely attempts to give you a taste for the more common scenarios you may find yourself in. Below I highlight a few chapters that I found interesting and useful. Overall the entire book is useful but a large portion covers open source tools that have a plethora of documentation and examples in existence.
Chapter 3 is just downright awesome. This chapter walks you through creating your own python based debugger that is similar to pydbg. Between the concepts and actual implementation you obtain a solid understanding of what is going on in a Windows based debugger.
Chapter 6 goes over Hooking in 5 pages.Read more ›
If the book has a fault, it's Justin's concise focus on using python as a tool to rapidly find and exploit bugs. As such the book is in a niche category. It doesn't really fulfill the subtitle "Python Programming for Hackers..." A more accurate subtitle might be "Python programming for expedited bug finding and exploitation". As such it lacks some things I would have expected from a more general book such as:
1. Using scapy or impacket for network tricks
2. Using python for phishing (this is a potential hot topic -- the Metasploit guys are working on a phishing addition for the framework so seeing something similar in python would be a plus).
3. Using python for generic security applications: web scraping, social network enumeration, gluing security tools, etc
All the above would have been nice additions to make the book more complete. As-is the book is very good, but you need to understand that it's not a general purpose python for hacking book. It is a great resource for debugging and automating dynamic analysis of executables.
Now for the super-hardcore exploit guys out there I would have liked to see more depth. I understand why the book didn't go into too much more detail -- the number of interested parties likely decreases exponentially.Read more ›
Most Recent Customer Reviews
I wasn't aware when I first purchased this that it was all focused on Windows OS. I purchased just before my move to South Korea, and had shipped my Windows PC, so all I have... Read morePublished 3 months ago by Yery
Provides the nitty gritty details needed to understand hacking procedures. Great companion to his Black Hat Python follow up.Published 8 months ago by Don R Rumford
I don't know if I was expecting too much of this book but as a computer security beginner, I found the topics very limited.Published 12 months ago by Nikolas Melissaris
This is a very useful book about how to establish your own debugger with python and use/learn PyDbg-Immunity debugger. I really advise the book. Read morePublished 20 months ago by Ibrahim Karaguzel
I really liked this book. If you are new to fuzzing, exploit development or Immunity Debugger or IDA Pro this book will be worth your time to check out. Read morePublished 22 months ago by Casey Dunham
New viewers and potential buyers should beware, this book was great in 2009. Python has evolved greatly since then. Read morePublished on October 8, 2014 by Vladimir
Quite a good technical book! Better if you if you can read between the lines. Hard core machine stuff, beautiful.Published on April 8, 2014 by Dylan W Randall