Gray Hat Python: Python Programming for Hackers and Reverse Engineers

Gray Hat Python: Python Programming for Hackers and Reverse Engineers

Book rating: 05 Paperback

By (author) Justin Seitz

$26.65
List price $40.60
You save $13.95 34% off

Free delivery worldwide
Available
Dispatched in 2 business days
When will my order arrive?

  • Publisher: No Starch Press,US
  • Format: Paperback | 216 pages
  • Dimensions: 178mm x 234mm x 3mm | 408g
  • Publication date: 1 May 2009
  • Publication City/Country: Daly City, California
  • ISBN 10: 1593271921
  • ISBN 13: 9781593271923
  • Illustrations note: black & white illustrations, black & white tables, figures
  • Sales rank: 74,734

Product description

Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write quickly, and it has the low-level support and libraries that make hackers happy. But until now, there has been no real manual on how to use Python for a variety of hacking tasks. You had to dig through forum posts and man pages, endlessly tweaking your own code to get everything working. Not anymore. Gray Hat Python explains the concepts behind hacking tools and techniques like debuggers, trojans, fuzzers, and emulators. But author Justin Seitz goes beyond theory, showing you how to harness existing Python-based security tools - and how to build your own when the pre-built ones won't cut it. You'll learn how to: * Automate tedious reversing and security tasks * Design and program your own debugger * Learn how to fuzz Windows drivers and create powerful fuzzers from scratch * Have fun with code and library injection, soft and hard hooking techniques, and other software trickery * Sniff secure traffic out of an encrypted web browser session * Use PyDBG, Immunity Debugger, Sulley, IDAPython, PyEMU, and more The world's best hackers are using Python to do their handiwork. Shouldn't you?

Other people who viewed this bought:

Showing items 1 to 10 of 10

Other books in this category

Showing items 1 to 11 of 11
Categories:

Author information

Justin Seitz is a Senior Security Researcher for Immunity, Inc., where he spends his time bug hunting, reverse engineering, writing exploits, and coding Python.

Customer reviews

By Nuno Povoa 11 Jun 2009 5

The book dives right into ctypes and dynamic libraries, from then on end your up for an interesting ride.

The debugger chapters are clearly the nitty gritty of this book. It was worth reading for the sheer amount of knowledge in those 3 or 4 chapters, even though the first time I skimmed the book I thought those were the chapters I was going to skip. Glad I didn't.

Personally I found the chapter on Fuzzing and Sulley to be immensely useful, regardless of both being very brief and the subject could very well be a book itself.

It's not a beginners book even though the author mentions that if you are new to python you should read the book front to back, I seriously doubt anyone new to python would get much out of this book. If you are looking for a book with a few recipes for quick deployment and use, this is not it. This book is much more about sharing knowledge than it is about giving you pre-fabricated code.

I would certainly love to see at least one or two network chapters in a book like this. There is just so much you need to automate during an enumeration or assessment phase and python is a wonderful tool for that. When you pick a title like "gray hat python" we all have our own expectations, no doubt based on our previous use of python in a security scenario.

So bottom line: for sheer compact knowledge and finding out what is under the hood I would certainly recommend this book, but I'd make it clear it's all about software vulnerabilities. :)

Table of contents

FOREWORDACKNOWLEDGMENTSINTRODUCTIONChapter 1: SETTING UP YOUR DEVELOPMENT ENVIRONMENTChapter 2: DEBUGGERS AND DEBUGGER DESIGNChapter 3: BUILDING A WINDOWS DEBUGGERChapter 4: PYDBG--A PURE PYTHON WINDOWS DEBUGGERChapter 5: IMMUNITY DEBUGGER--THE BEST OF BOTH WORLDSChapter 6: HOOKINGChapter 7: DLL AND CODE INJECTIONChapter 8: FUZZINGChapter 9: SULLEYChapter 10: FUZZING WINDOWS DRIVERSChapter 11: IDAPYTHON--SCRIPTING IDA PROChapter 12: PYEMU--THE SCRIPTABLE EMULATOR