Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

Violent Python A Cookbook for Hackers Forensic Analysts Penetration Testers and Security Engineers Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation Instead of relying on another attacker s tools this book will teach

  • Title: Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
  • Author: T.J. O'Connor
  • ISBN: 9781597499576
  • Page: 164
  • Format: Paperback
  • Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation Instead of relying on another attacker s tools, this book will teach you to forge your own weapons using the Python programming language This book demonstrates how to write Python scripts to automate large scale network attacks, extract metaViolent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation Instead of relying on another attacker s tools, this book will teach you to forge your own weapons using the Python programming language This book demonstrates how to write Python scripts to automate large scale network attacks, extract metadata, and investigate forensic artifacts It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data mine popular social media websites and evade modern anti virus.Demonstrates how to write Python scripts to automate large scale network attacks, extract metadata, and investigate forensic artifactsWrite code to intercept and analyze network traffic using Python Craft and spoof wireless frames to attack wireless and Bluetooth devicesData mine popular social media websites and evade modern anti virus

    • [PDF] Download ↠ Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers | by ☆ T.J. O'Connor
      164 T.J. O'Connor
    • thumbnail Title: [PDF] Download ↠ Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers | by ☆ T.J. O'Connor
      Posted by:T.J. O'Connor
      Published :2020-02-13T12:23:20+00:00

    One Reply to “Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers”

    1. Disappointing.This book is for beginner scripters seeking an intro to some useful python libraries.For any depth (how those libraries work under the hood, for example), look elsewhere.I was expecting more implementation, rather than just calling into other peoples code where all the fun has been abstracted out.Consequently, most of the exercises over-promise and under-deliver.The only reason I finished is because the simplicity made it a quick read.Examples of why I was disappointed:"Building a [...]

    2. The book is split into six main chapters, and an intro chapter. Each chapter focuses on a specific topic of cracking via python. I enjoyed some chapters more than others.The first chapter was just an intro to python. I don't know if it's any good.The second chapter was about building botnets with a few simple attack vectors, simple bruteforce cracking of ssh/ftp, cracking ssh keys, and interacting with metasploit.The third chapter was forensic investigations with python. Honestly my favorite par [...]

    3. Cool book if you want to know how to use python in security field. It mostly about smart usage of API and libraries but still cool and interesting.

    4. Me terminó de convencer en lo práctico que resulta Python. En cuanto a técnicas de hacking es algo básico, pero creo que apunta a eso. Aunque sea 2012, me parece que no está del todo actualizado. A excepción por hablar sobre Flame y su complejidad al evadir por más de dos años a todas las firmas de antivirus.Pero como dije, me vendió uy bien Python como lenguaje simple y práctico.

    5. A joyful introduction to netsec using Python and its myriad of third party libraries as your toolbox. I highly recommend it! The examples are well executed and easy to comprehend (and easy to maintain and extend!)

    6. This book give you a really great idea about how to use python the smart way , few lines of codes on the fly make you avoid searching , installation or usage of many other toolshighly recommended for every pentrster

    7. Python is the perfect language for quickly creating forensics tools. The language is easy to learn and has the power of classes. The book does a great job teaching beginners and is a great reference.

    8. This is a very interesting book. On this book Connor achieves a very difficult objective. The work it has done here is simultaneously broad, historical relevant and relatively deep in content while simplifying to the maximum the approach and the code developed. The language sits like a glove here as well as the frameworks chosen to tackle every single problem purposed. The author is a very pragmatic one and, as you'll see as soon as you read the book, knowledgeable one. I truly recommend this bo [...]

    9. You should wrestle the violent python! It's filled with quick and easy language, fun anecdotes and very violent python snipplets. When combined with your own creativity and playfullness there's no end to just how easy you can unleash the python on your own network, your friends and your social media accounts.The book takes you through 3rd party libraries for analysing network traffic, reading geo locations etc. All examples are simple, so if you're looking for sofisticated cookbook examples on h [...]

    10. This was a pretty interesting book on using Python for a variety of tasks that are mentioned in the title. I am relatively newto Python and found it to be a useful way to be introduced to how things can be done and what modules would be needed to do them.In general I found the code in the book to be clear enough that I was able to follow it, and the concepts where easily understandable. There were times that I would have trouble with the code in a chapter which would lead to a couple of hours go [...]

    11. It is written in a humorous writing style, which makes it a fun read. However it feels like I am not the intended audience for this book. As an experienced python developer the coding parts seemed very trivial (it begins from the very basics). On the upside there are some interesting introductions to some third party libraries. The security bits where often interesting and based of on real attacks, which I liked. However there were not much depth in explaining the attacks or the methology behind [...]

    12. First of all i would like to thanks TJ. O'Conner for writing this wonderful book i really enjoyedw i come to reviewIn this book the author has done wonderful job by taking excellent examples from past (infosec field) to demonstrate various tools and technique using the power of python language,the codes are easy to understand and the example which author has chosen for this cook book add more excitement in the reader that not to stop reading this book, apart from the code and examples the langua [...]

    13. This is a fantastic book for anyone interested in starting onto the world of hacking. You will need basic level of coding experience and understanding of computer security and networking because after the first chapter, it quickly gets going. It offers a fast track into various hacking techniques used in real world cases. Guiding the readers through how attacks were conducted and what he counter measurements necessary to mitigate them. This is easily one of the most relevant and interesting book [...]

    14. An excellent resource that motivates many of my students to dive deeper into programming. That it uses python is even more up our street. The examples are skimpy and not 'real world' in any sense of the phrase but they get across a lot of ideas and open up a pathway that my students can then follow to further their knowledge of computer systems. My sequence in teaching computing is Learn Python the Hard Way >> Dive Into Python 3 >> This book >> The Elements of Computer Systems [...]

    15. Nice book. TJ O'Connor's background is enough to make you want to read it. Although his prose can be vague or redundant, his python is quite interesting. For instance, I loved how he uses exceptions to output a successful match of a brute force password cracker, rather than loop until it equals x.Another great reason to read this book is for the bibliography. It has some excellent references which will keep me busy for quite some time.

    16. First chapter. No idea how to crack random generated passwords, when there are billions of billions of possible combinations.On the other hand, after reading this book, got lots of information, doesn't matter it's on outdated Python 2.7, many even tech aware people use ridiculously idiotic short, one word passwords for wireless routers, password and crypto-wallets. With increasing "technologization", just one undetectable keylogger and someone can steal everything, not just data.

    17. Its a 2012 book, thus a little bit outdated, but nonetheless it shows you a collection of attack techniques. Repeating all the code at the end on a chapter is somehow irritating. Learned: - Ironically, Guido's efforts to create a beginner friendly language for CS-newbies ended in Python being the best language for criminal hackers!

    18. First a warning -- don't expect to get some deep Python insights from this book. That isn't really the point. The book shines as a tour of the wide range of Python tools that you can use to wreak havoc (or defend against that) on your network.I really enjoyed the parts on using scapy and dpkg to parse captured network packets, sniff them yourself, and craft your own ones.

    19. i enjoyed this book. i did read it entirely, but i mostly liked to see s e of pythons dark side.i knew some of the tools mentioned on this book, but i really did not know how much interesting they are. the author successfully combined pythons simple nature with classical security breaches exampless interesting, but not for beginners

    20. This book had a lot of good examples and I really liked the various modules that were incorporated for various use cases. The source code in the book could have been better aligned as in certain spots it was difficult to tell which section you were in given various indents. Overall I would recommend it.

    21. bom livro para entender um pouco sobre invasões, ele conta a história de várias invasões e implementa o código em python. Apesar do livro ser atual (2012), bugs surgem e são corrigidos a todo momento, então, esse assunto está sempre desatualizado.

    22. Some things are overly simplified, but overall a good book that shows the simplicity of huge security holes in the past.

    23. Accidentally bought this with 1-click. It wasn't actually that bad though. Doesn't really cover much that is immediately useful to me, and I was already familiar with a lot of the material.

    24. Learned tons of new knowledge within these pages. Plus some working knowledge of the network. It is a very good book for python programmers to make a step from primary to intermediate.

    Leave a Reply

    Your email address will not be published. Required fields are marked *