In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), youall explore the darker side of Pythonas capabilitiesawriting network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, and more. Youall learn how to: Create a trojan command-and-control using GitHubDetect sandboxing and automate comAsmon malware tasks, like keylogging and screenshottingEscalate Windows privileges with creative process controlUse offensive memory forensics tricks to retrieve password hashes and inject shellcode into a virtual machineExtend the popular Burp Suite web-hacking toolAbuse Windows COM automation to perform a man-in-the-browser attackExfiltrate data from a network most sneakily Insider techniques and creative challenges throughout show you how to extend the hacks and how to write your own exploits. When it comes to offensive security, your ability to create powerful tools on the fly is indispensable. Learn how in Black Hat Python.Their purpose can vary from continually registering to a central inventory service to forcing updates of software from their own repositories. ... might see process records that look like this: 20130907233515.914176-300, NT AUTHORITY\ SYSTEM, C:\WINDOWS\system32\cscript. ... html import tempfile import threading import win32file import win32con import os # these are the common temp file directories uanbsp;...
|Title||:||Black Hat Python|
|Publisher||:||No Starch Press - 2014-12-14|