MARC details
000 -LEADER |
fixed length control field |
03481cam a22004577i 4500 |
001 - CONTROL NUMBER |
control field |
22227597 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20231103105519.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
210909s2021 caua e 001 0 eng d |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2021287694 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781718501126 |
Qualifying information |
(paperback) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
1718501129 |
Qualifying information |
(paperback) |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(OCoLC)on1249107681 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
TOH |
Language of cataloging |
eng |
Transcribing agency |
TOH |
Description conventions |
rda |
Modifying agency |
OCLCO |
-- |
OCLCF |
-- |
UAP |
-- |
OCLCO |
-- |
OCL |
-- |
OCLCO |
-- |
BKL |
-- |
DLC |
042 ## - AUTHENTICATION CODE |
Authentication code |
lccopycat |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.9.A25 |
Item number |
S456 2021 |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Edition number |
23 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Seitz, Justin, |
Relator term |
author. |
245 10 - TITLE STATEMENT |
Title |
Black hat Python : |
Remainder of title |
Python programming for hackers and pentesters / |
Statement of responsibility, etc. |
by Justin Seitz and Tim Arnold. |
250 ## - EDITION STATEMENT |
Edition statement |
2nd edition. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
San Francisco, CA : |
Name of producer, publisher, distributor, manufacturer |
No Starch Press, |
Date of production, publication, distribution, manufacture, or copyright notice |
[2021] |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xviii, 190 pages : |
Other physical details |
illustrations ; |
Dimensions |
24 cm |
336 ## - CONTENT TYPE |
Content type term |
text |
Content type code |
txt |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
unmediated |
Media type code |
n |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
volume |
Carrier type code |
nc |
Source |
rdacarrier |
500 ## - GENERAL NOTE |
General note |
Includes index. |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Setting up your Python environment -- Basic networking tools -- Writing a sniffer -- Owning the network with Scapy -- Web hackery -- Extending Burp proxy -- GitHub command and control -- Common trojaning tasks on Windows -- Fun with exfiltration -- Windows privilege escalation -- Offensive forensics. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
"When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. In this second edition of the bestselling Black Hat Python, you'll explore the darker side of Python's capabilities: everything from writing network sniffers, stealing email credentials, and bruteforcing directories to crafting mutation fuzzers, investigating virtual machines, and creating stealthy trojans. All of the code in this edition has been updated to Python 3.x. You'll also find new coverage of bit shifting, code hygiene, and offensive forensics with the Volatility Framework as well as expanded explanations of the Python libraries ctypes, struct, lxml, and BeautifulSoup, and offensive hacking strategies like splitting bytes, leveraging computer vision libraries, and scraping websites. You'll even learn how to: Create a trojan command-and-control server using GitHub Detect sandboxing and automate common malware tasks like keylogging and screenshotting Extend the Burp Suite web-hacking tool Escalate Windows privileges with creative process control Use offensive memory forensics tricks to retrieve password hashes and find vulnerabilities on a virtual machine Abuse Windows COM automation Exfiltrate data from a network undetected When it comes to offensive security, you need to be able to create powerful tools on the fly. Learn how with Black Hat Python." --Amazon.com. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Python (Computer program language) |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer programming. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer programming. |
Source of heading or term |
fast |
Authority record control number or standard number |
(OCoLC)fst00872390 |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security. |
Source of heading or term |
fast |
Authority record control number or standard number |
(OCoLC)fst00872484 |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Python (Computer program language) |
Source of heading or term |
fast |
Authority record control number or standard number |
(OCoLC)fst01084736 |
655 #7 - INDEX TERM--GENRE/FORM |
Genre/form data or focus term |
Handbooks and manuals. |
Source of term |
fast |
Authority record control number or standard number |
(OCoLC)fst01423877 |
655 #7 - INDEX TERM--GENRE/FORM |
Genre/form data or focus term |
Handbooks and manuals. |
Source of term |
lcgft |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Arnold, Tim |
Titles and other words associated with a name |
(Computer software developer), |
Relator term |
author. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Miller, Charles Alfred, |
Relator term |
writer of foreword. |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
a |
7 |
b |
cbc |
c |
copycat |
d |
2 |
e |
ncip |
f |
20 |
g |
y-gencatlg |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Suppress in OPAC |
No |