Black Hat Python: Python Programming for Hackers and Pentesters

Some Quotes from the Author with my Notes, Thoughts, and the Occasional Opinion

Book Cover

Book Title Author Purchased Digital or Physical
Black Hat Python Justin Seitz Yes Digital

Chapter One - Setting Up Your Python Environment

Setting Up Your Environment

VMWare Player is recommended to run the different virtual machines.

Kali Linux is a requirement for many of the exersises in the book so you will need have it installed. The book specifically uses kali-linux-1.0.9-vm-i486.7z.

The book uses Python version 2.7 which is the version installed on the suggested Kali Linux version.

WingIDE is the IDE the author uses and recomends the reader use for the exersises in the book.

Chapter Two - The Network: Basics

Justin Seitz

"An attacker can do almost anything with simple network access, such as scan for hosts, inject packets, sniff data, remotely exploit hosts, and much more. But if you are an attacker who has worked your way into the deepest depths of an enterprise target, you may find yourself in a bit of a conundrum: you have no tools to execute network attacks. No netcat. No Wireshark. No compiler and no means to install one. However, you might be surprised to find that in may cases you'll find a Python install."