You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
125 lines
5.3 KiB
125 lines
5.3 KiB
11 months ago
|
<!DOCTYPE html>
|
||
|
<html lang="en">
|
||
|
<head>
|
||
|
<meta http-equiv="X-UA-Compatible" content="IE=edge">
|
||
|
<meta http-equiv="content-type" content="text/html; charset=utf-8">
|
||
|
|
||
|
<!-- Enable responsiveness on mobile devices-->
|
||
|
<!-- viewport-fit=cover is to support iPhone X rounded corners and notch in landscape-->
|
||
|
<meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1, viewport-fit=cover">
|
||
|
|
||
|
<title>Julio Biason .Me 4.3</title>
|
||
|
|
||
|
<!-- CSS -->
|
||
|
<link rel="stylesheet" href="https://blog.juliobiason.me/print.css" media="print">
|
||
|
<link rel="stylesheet" href="https://blog.juliobiason.me/poole.css">
|
||
|
<link rel="stylesheet" href="https://blog.juliobiason.me/hyde.css">
|
||
|
<link rel="stylesheet" href="https://fonts.googleapis.com/css?family=PT+Sans:400,400italic,700|Abril+Fatface">
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
</head>
|
||
|
|
||
|
<body class=" ">
|
||
|
|
||
|
<div class="sidebar">
|
||
|
<div class="container sidebar-sticky">
|
||
|
<div class="sidebar-about">
|
||
|
|
||
|
<a href="https://blog.juliobiason.me"><h1>Julio Biason .Me 4.3</h1></a>
|
||
|
|
||
|
<p class="lead">Old school dev living in a 2.0 dev world</p>
|
||
|
|
||
|
|
||
|
</div>
|
||
|
|
||
|
<ul class="sidebar-nav">
|
||
|
|
||
|
|
||
|
<li class="sidebar-nav-item"><a href="/">English</a></li>
|
||
|
|
||
|
<li class="sidebar-nav-item"><a href="/pt">Português</a></li>
|
||
|
|
||
|
<li class="sidebar-nav-item"><a href="/tags">Tags (EN)</a></li>
|
||
|
|
||
|
<li class="sidebar-nav-item"><a href="/pt/tags">Tags (PT)</a></li>
|
||
|
|
||
|
|
||
|
</ul>
|
||
|
</div>
|
||
|
</div>
|
||
|
|
||
|
|
||
|
<div class="content container">
|
||
|
|
||
|
<div class="post">
|
||
|
<h1 class="post-title">Black Hat Python: Python Programming for Hackers and Pentesters - Justin Seitz</h1>
|
||
|
<span class="post-date">
|
||
|
2016-12-26
|
||
|
|
||
|
<a href="https://blog.juliobiason.me/tags/books/">#books</a>
|
||
|
|
||
|
<a href="https://blog.juliobiason.me/tags/justin-seitz/">#justin seitz</a>
|
||
|
|
||
|
<a href="https://blog.juliobiason.me/tags/python/">#python</a>
|
||
|
|
||
|
<a href="https://blog.juliobiason.me/tags/pentest/">#pentest</a>
|
||
|
|
||
|
<a href="https://blog.juliobiason.me/tags/reviews/">#reviews</a>
|
||
|
|
||
|
<a href="https://blog.juliobiason.me/tags/it/">#it</a>
|
||
|
|
||
|
<a href="https://blog.juliobiason.me/tags/stars-2/">#stars:2</a>
|
||
|
|
||
|
<a href="https://blog.juliobiason.me/tags/published-2014/">#published:2014</a>
|
||
|
|
||
|
</span>
|
||
|
<p><a href="https://www.goodreads.com/book/show/22299369-black-hat-python">GoodReads Summary</a>:
|
||
|
When it comes to creating powerful and effective hacking tools, Python is the
|
||
|
language of choice for most security analysts. But just how does the magic
|
||
|
happen?</p>
|
||
|
<span id="continue-reading"></span><div>
|
||
|
★★☆☆☆
|
||
|
</div>
|
||
|
<p>The very first chapter give me high hopes for this book: Since Python is
|
||
|
basically part of every single Linux install, you could do a shitton
|
||
|
retrieving system and user information by just using the normal packages. You
|
||
|
won't even need to install nmap or similar; using plain Python packages, you
|
||
|
could check which services are running and such.</p>
|
||
|
<p>But then, things go downhill.</p>
|
||
|
<p>After the first chapter, you start to add Python packages, which means you
|
||
|
need to have root access -- and even if you use something like a virtualenv,
|
||
|
you still would announce yourself by requesting things over the net using
|
||
|
<code>easy_install</code> (the book never mentions <code>pip</code> -- heck,
|
||
|
it doesn't even <em>mentions</em> virtualenv to avoid being root), which could be
|
||
|
easily blocked by sysadmins if your company doesn't have anything with Python.</p>
|
||
|
<p>And it doesn't stop at that: after these starting chapters, it start hacking
|
||
|
Windows machines. Heck, Python is not installed by default on Windows and a
|
||
|
py2exe executable weights something like 15Mb, which isn't much in bandwidth,
|
||
|
but it's noticeable. And then it starts installing packages and more packages
|
||
|
and requesting to run things as administrator, which would surely be a hassle.</p>
|
||
|
<p>The Python code itself is simplistic, to say the least. At the very first
|
||
|
chapters I noticed that the code was basically C code translated to Python,
|
||
|
which wouldn't be a problem if you're thinking about replacing basic hack code
|
||
|
with Python code -- because it is easier to find Python installed than GCC,
|
||
|
for example -- but with the problems cited above actually make me think that
|
||
|
the author never really cared about Pythonic code, just did the very minimum
|
||
|
to make code run and that's it.</p>
|
||
|
<p>So, it's a bad book about hacking because it requires privileged access
|
||
|
beforehand and it's a bad book about Python because it doesn't follow Python
|
||
|
good practices. In the end, it's just a book with a few interesting Python
|
||
|
libraries, nothing more.</p>
|
||
|
|
||
|
</div>
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
</div>
|
||
|
|
||
|
</body>
|
||
|
|
||
|
</html>
|