You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
124 lines
5.3 KiB
124 lines
5.3 KiB
<!DOCTYPE html> |
|
<html lang="en"> |
|
<head> |
|
<meta http-equiv="X-UA-Compatible" content="IE=edge"> |
|
<meta http-equiv="content-type" content="text/html; charset=utf-8"> |
|
|
|
<!-- Enable responsiveness on mobile devices--> |
|
<!-- viewport-fit=cover is to support iPhone X rounded corners and notch in landscape--> |
|
<meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1, viewport-fit=cover"> |
|
|
|
<title>Julio Biason .Me 4.3</title> |
|
|
|
<!-- CSS --> |
|
<link rel="stylesheet" href="https://blog.juliobiason.me/print.css" media="print"> |
|
<link rel="stylesheet" href="https://blog.juliobiason.me/poole.css"> |
|
<link rel="stylesheet" href="https://blog.juliobiason.me/hyde.css"> |
|
<link rel="stylesheet" href="https://fonts.googleapis.com/css?family=PT+Sans:400,400italic,700|Abril+Fatface"> |
|
|
|
|
|
|
|
|
|
|
|
</head> |
|
|
|
<body class=" "> |
|
|
|
<div class="sidebar"> |
|
<div class="container sidebar-sticky"> |
|
<div class="sidebar-about"> |
|
|
|
<a href="https://blog.juliobiason.me"><h1>Julio Biason .Me 4.3</h1></a> |
|
|
|
<p class="lead">Old school dev living in a 2.0 dev world</p> |
|
|
|
|
|
</div> |
|
|
|
<ul class="sidebar-nav"> |
|
|
|
|
|
<li class="sidebar-nav-item"><a href="/">English</a></li> |
|
|
|
<li class="sidebar-nav-item"><a href="/pt">Português</a></li> |
|
|
|
<li class="sidebar-nav-item"><a href="/tags">Tags (EN)</a></li> |
|
|
|
<li class="sidebar-nav-item"><a href="/pt/tags">Tags (PT)</a></li> |
|
|
|
|
|
</ul> |
|
</div> |
|
</div> |
|
|
|
|
|
<div class="content container"> |
|
|
|
<div class="post"> |
|
<h1 class="post-title">Black Hat Python: Python Programming for Hackers and Pentesters - Justin Seitz</h1> |
|
<span class="post-date"> |
|
2016-12-26 |
|
|
|
<a href="https://blog.juliobiason.me/tags/books/">#books</a> |
|
|
|
<a href="https://blog.juliobiason.me/tags/justin-seitz/">#justin seitz</a> |
|
|
|
<a href="https://blog.juliobiason.me/tags/python/">#python</a> |
|
|
|
<a href="https://blog.juliobiason.me/tags/pentest/">#pentest</a> |
|
|
|
<a href="https://blog.juliobiason.me/tags/reviews/">#reviews</a> |
|
|
|
<a href="https://blog.juliobiason.me/tags/it/">#it</a> |
|
|
|
<a href="https://blog.juliobiason.me/tags/stars-2/">#stars:2</a> |
|
|
|
<a href="https://blog.juliobiason.me/tags/published-2014/">#published:2014</a> |
|
|
|
</span> |
|
<p><a href="https://www.goodreads.com/book/show/22299369-black-hat-python">GoodReads Summary</a>: |
|
When it comes to creating powerful and effective hacking tools, Python is the |
|
language of choice for most security analysts. But just how does the magic |
|
happen?</p> |
|
<span id="continue-reading"></span><div> |
|
★★☆☆☆ |
|
</div> |
|
<p>The very first chapter give me high hopes for this book: Since Python is |
|
basically part of every single Linux install, you could do a shitton |
|
retrieving system and user information by just using the normal packages. You |
|
won't even need to install nmap or similar; using plain Python packages, you |
|
could check which services are running and such.</p> |
|
<p>But then, things go downhill.</p> |
|
<p>After the first chapter, you start to add Python packages, which means you |
|
need to have root access -- and even if you use something like a virtualenv, |
|
you still would announce yourself by requesting things over the net using |
|
<code>easy_install</code> (the book never mentions <code>pip</code> -- heck, |
|
it doesn't even <em>mentions</em> virtualenv to avoid being root), which could be |
|
easily blocked by sysadmins if your company doesn't have anything with Python.</p> |
|
<p>And it doesn't stop at that: after these starting chapters, it start hacking |
|
Windows machines. Heck, Python is not installed by default on Windows and a |
|
py2exe executable weights something like 15Mb, which isn't much in bandwidth, |
|
but it's noticeable. And then it starts installing packages and more packages |
|
and requesting to run things as administrator, which would surely be a hassle.</p> |
|
<p>The Python code itself is simplistic, to say the least. At the very first |
|
chapters I noticed that the code was basically C code translated to Python, |
|
which wouldn't be a problem if you're thinking about replacing basic hack code |
|
with Python code -- because it is easier to find Python installed than GCC, |
|
for example -- but with the problems cited above actually make me think that |
|
the author never really cared about Pythonic code, just did the very minimum |
|
to make code run and that's it.</p> |
|
<p>So, it's a bad book about hacking because it requires privileged access |
|
beforehand and it's a bad book about Python because it doesn't follow Python |
|
good practices. In the end, it's just a book with a few interesting Python |
|
libraries, nothing more.</p> |
|
|
|
</div> |
|
|
|
|
|
|
|
|
|
</div> |
|
|
|
</body> |
|
|
|
</html>
|
|
|