Black Hat Python: Python Programming for Hackers and Pentesters
Some Quotes from the Author with my Notes, Thoughts, and the Occasional Opinion
|Book Title||Author||Purchased||Digital or Physical|
|Black Hat Python||Justin Seitz||Yes||Digital|
Chapter One - Setting Up Your Python Environment
Setting Up Your Environment
VMWare Player is recommended to run the different virtual machines.
Kali Linux is a requirement for many of the exersises in the book so you will need have it installed. The book specifically uses kali-linux-1.0.9-vm-i486.7z.
The book uses Python version 2.7 which is the version installed on the suggested Kali Linux version.
WingIDE is the IDE the author uses and recomends the reader use for the exersises in the book.
Chapter Two - The Network: Basics
"An attacker can do almost anything with simple network access, such as scan for hosts, inject packets, sniff data, remotely exploit hosts, and much more. But if you are an attacker who has worked your way into the deepest depths of an enterprise target, you may find yourself in a bit of a conundrum: you have no tools to execute network attacks. No netcat. No Wireshark. No compiler and no means to install one. However, you might be surprised to find that in may cases you'll find a Python install."