Start reading Violent Python on your Kindle in under a minute. Don't have a Kindle? Get your Kindle here or start reading now with a free Kindle Reading App.

Deliver to your Kindle or other device

 
 
 

Try it free

Sample the beginning of this book for free

Deliver to your Kindle or other device

Sorry, this item is not available in
Image not available for
Colour:
Image not available
 

Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers [Kindle Edition]

TJ O'Connor
4.5 out of 5 stars  See all reviews (18 customer reviews)

Print List Price: £30.99
Kindle Price: £20.02 includes VAT* & free wireless delivery via Amazon Whispernet
You Save: £10.97 (35%)
* Unlike print books, digital books are subject to VAT.

Free Kindle Reading App Anybody can read Kindle books—even without a Kindle device—with the FREE Kindle app for smartphones, tablets and computers.

To get the free app, enter your e-mail address or mobile phone number.

Formats

Amazon Price New from Used from
Kindle Edition £20.02  
Paperback £21.07  
Earn a Free Kindle Book
Earn a Free Kindle Book
Buy a Kindle book between now and 31 March and receive a promotional code good for one free Kindle book. Terms and conditions apply. Learn more

Book Description

Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker’s tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus.



- Demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts.

- Write code to intercept and analyze network traffic using Python. Craft and spoof wireless frames to attack wireless and Bluetooth devices.

- Data-mine popular social media websites and evade modern anti-virus.



Product Description

Review

"An information security specialist with the US Army, O'Connor introduces the hacker's programming language Python to new users, and describes some advanced features to those who already know it."--Reference and Research Book News, August 2013 "A quick glance at [the authors] collective credentials and experience undoubtedly creates high expectations for this title. The end result is that the book demonstrates how powerful just a few dozen lines of Python code can be. useful tips and tricks will surely be acquired simply by working through the exercises."--The Ethical Hacker Network, February 27, 2013 "Violent Python is an excellent resource that develops and enhances a diverse set of security-related Python skills. The book also serves as a great reference, where recipes could be quickly implemented to address specific issues as they arise. Readers who are actively working in an InfoSec position will likely be able to put their newly acquired skills to use immediately, and those looking to break into the field will acquire skills that differentiate themselves from others who are dependent on prebuilt tools. This title is highly recommended for anyone who wants to improve his or her Python skills within the InfoSec realm."--The Ethical Hacker Network, February 27, 2013 "When it comes to Python and penetration testing, TJ O'Connor is the grand Python master. This is the book that keeps on giving. From building penetration testing Python scripts, to antivirus-evading penetration testing malware, to interrogating the Windows Registry and investigating other forensic artifacts...O'Connor masterfully walks the reader from basic to advanced penetration testing techniques with sample code throughout."--Ove Carroll, SANS Certified Instructor, Co-Author of SANS Forensics 408 - Windows In Depth "Violent Python is chalked full of practical examples and is for all security professionals. It covers the spectrum - knowledge for pen testers to forensic analysts, beginner to advanced and offensive to defensive tasks. If you are involved in information security and are looking for a Python book, this is an excellent source."--James Shewmaker, Security Analyst, Bluenotch Corporation "The best hackers know when to write their own tools. Violent Python is a very relevant collection of examples to seed your personal hacking toolbox. From offensive actions to digital forensics, this book has useful bits for everyone."--Raphael Mudge, Creator of Armitage

About the Author

TJ O'Connor is a Department of Defense expert on information security and a US Army paratrooper. While assigned as an assistant professor at the US Military Academy, TJ taught undergraduate courses on forensics, exploitation and information assurance. He twice co-coached the winning team at the National Security Agency's annual Cyber Defense Exercise and won the National Defense University's first annual Cyber Challenge. He has served on multiple red teams, including twice on the Northeast Regional Team for the National Collegiate Cyber Defense Competition. TJ holds a Master of Science degree in Computer Science from North Carolina State, a Master of Science degree in Information Security Engineering from the SANS Technical Institute, and a Bachelor of Science degree in Computer Science from the US Military Academy. He has published technical research at USENIX workshops, ACM conferences, security conferences, the SANS Reading Room, the Internet Storm Center, the Army Magazine, and the Armed Forces Journal. He holds expert cyber security credentials, including the prestigious GIAC Security Expert (GSE) and Offensive Security Certified Expert (OSCE). TJ is a member of the elite SANS Red and Blue Team Cyber Guardians. TJ O'Connor is an active duty Army Major and former faculty member at the United States Military Academy, where he taught courses on forensics, exploitation, and information assurance. He has published research at USENIX workshops, ACM Conferences, and spoken at various security conferences, including ShmooCon. He has participated in numerous cyber defense exercises, including winning the National Defense University Cyber Challenge, coaching the winning team at the National Security Agency's Cyber Defense Exercise and working as a red team member of the Northeast Regional Collegiate Cyber Defense Competition. He has earned the SANS Certifications GIAC Gold certifications in GCFA, GCIH, GSEC, GCIA, and ho

Product details

  • Format: Kindle Edition
  • File Size: 2033 KB
  • Print Length: 289 pages
  • Publisher: Syngress; 1 edition (28 Dec. 2012)
  • Sold by: Amazon Media EU S.à r.l.
  • Language: English
  • ASIN: B00ABY67JS
  • Text-to-Speech: Enabled
  • X-Ray:
  • Word Wise: Not Enabled
  • Average Customer Review: 4.5 out of 5 stars  See all reviews (18 customer reviews)
  • Amazon Bestsellers Rank: #78,464 Paid in Kindle Store (See Top 100 Paid in Kindle Store)
  •  Would you like to give feedback on images?


More About the Author

Discover books, learn about writers, and more.


Customer Reviews

Most Helpful Customer Reviews
10 of 10 people found the following review helpful
5.0 out of 5 stars Worth every penny! 4 July 2013
By Andy
Format:Paperback|Verified Purchase
I decided to buy this book and use it's python examples to learn the language in a fun/useful way. having read quite a lot of books on the subject I must say that the author has done a great work with this book. Every chapter is based on some historical event (in digital security) which you'll then recreate in an easy step by step guide. In this way every script you make has a context. You have a reason for writing the script. You'll both write defensive tools, which can prevent or trace an attack, but you'll also laucnh some attacks yourself. There's even a chapter on forensics where you'll learn how to get hold of all the data stored by Skype, Firefox and Itunes(Iphone).

Reading this book will give you a better understanding on IT security and the Python language, but more advanced readers/nerds may not find the book as useful as a newbie . Highly recommended as an introduction to Python and IT security .
Was this review helpful to you?
8 of 8 people found the following review helpful
Format:Paperback|Verified Purchase
I give this book 3 stars for introducing me to Metasploit and some interesting Python libraries, but withhold 2 stars for being riddled with mistakes in both the text and the code. I really hope nobody is using the horrible examples in this book to learn Python. It's also too expensive for what it is.
Was this review helpful to you?
3 of 3 people found the following review helpful
5.0 out of 5 stars Great practical examples 2 Aug. 2013
By S. MARR
Format:Paperback|Verified Purchase
Good use of python and shows the flexibility by using lower-level interfaces to gather the data and then being able to manipulate the data. The examples are great to either take directly or to use for your own code. Good explanations of the source code too.
Comment | 
Was this review helpful to you?
7 of 8 people found the following review helpful
5.0 out of 5 stars well thought through and well written 30 May 2013
Format:Paperback|Verified Purchase
The user will need some basic python knowledge before they use this book but I would imagine they could work through the python manual at the same time as reading this.

I really like this book, ok some parts can be described as introductory but they inform the reader enough so that they can go out and apply what they have learned.

If you are looking for a set of scripts you can use out of the box this book will satisfy you, however if you are looking for good ideas that you can pick up and run with this book has lots of them.

I really enjoyed this book as it reminded me of simple scripts I wrote years ago and provided the basis for some quite intelligent scripts I have written since.

This was well worth the money.
Comment | 
Was this review helpful to you?
2 of 2 people found the following review helpful
5.0 out of 5 stars Useful, genuine stuff 14 May 2014
Format:Paperback|Verified Purchase
I bought this so I could pen test my own stuff that I'm doing at work. I figure as a developer I have a responsibility to at least try & make my code secure. Has interesting chapters about taking command of drones in flight which I doubt I'll make use of but still, interesting to say the least.
Comment | 
Was this review helpful to you?
1 of 1 people found the following review helpful
4.0 out of 5 stars Nice book - needs setup 31 Mar. 2014
By Mr B.
Format:Paperback|Verified Purchase
I really like this book. It's a great way of learning python (and some linux) networking tools. It does, however, require some set up to create a safe environment to try out the scripts and would really benefit from a section that helps the user create a virtual pen-test setup for someone who is completely new to pen-testing.

I'd advise that if you are new to this then you will want to look around on Google for advice on setting up a virtual pen-test environment using Kali, metasploitable and a vulnerable windows system.
Was this review helpful to you?
4 of 5 people found the following review helpful
5.0 out of 5 stars Great and inspirational! 22 Mar. 2014
Format:Paperback
I've read this book from front to back about three times, and this has to be one of the best books, I've ever read about Python and hacking.
The author is very informative, straight to the point and shares some great stories.
I'm a rookie when it comes to python. I always thought that python has a huge potential as a "hackers programming language" and this books really shows why python is an awesome programming/scripting language. This book rekindled my passion to learn how to make my own tools.
Some of the exploits are old tricks, but it's hard to keep up with the hacking scene. But I have to say I actually use some of the programs that are taught/made in this book.
If you like Python and hacking, buy this book.
Comment | 
Was this review helpful to you?
5.0 out of 5 stars An outstanding book 27 Nov. 2013
Format:Paperback|Verified Purchase
I would highly recommend this book. The author's writing style is easy to follow and the information is pitched at the right level.
There are lots of examples of usage with many ideas for coding projects. The author starts with an intro to Python's syntax and functions for those new to Python.
I would recommend this to any one from pentesters to students of networking and computer science. An easy 5 stars.
Comment | 
Was this review helpful to you?
Would you like to see more reviews about this item?
Were these reviews helpful?   Let us know
Most Recent Customer Reviews
1.0 out of 5 stars The instructions right from the beginning were not clear at ...
The instructions right from the beginning were not clear at all; as a beginner I could have used a bit more guidance into setting up a pen-environment and just what exactly I... Read more
Published 1 month ago by Chris Hiew
4.0 out of 5 stars Nice
Great examples, made think of alternative approaches to pen testing which always good.
Published 3 months ago by S
5.0 out of 5 stars Great
No better way to learn python than learning how to end up in jail. I joke, the book is fantastic.
Published 5 months ago by Anthony
5.0 out of 5 stars Five Stars
Great education
Published 7 months ago by Gunnar
4.0 out of 5 stars Got my imagination going, but messy code examples!
This book really got my imagination going, the Author is very knowledgeable. You should put this book on your reading. Read more
Published 10 months ago by Glyn jackson
5.0 out of 5 stars The one book thats never on the shelf
I love this book. I bought it hopign id be able to learn the python skills needed to go off and make pentesting tools. Read more
Published 11 months ago by D. Reece
5.0 out of 5 stars Good Book
This is a very interesting book. Easy to follow.
Would recommend it. Has very good examples. Ideal for anyone looking at security and pen testing.
Published 13 months ago by Michael W Daley
5.0 out of 5 stars Perfect Book
This book explains so perfectly that it is hard to believe is so easy to achieve all that using python. Highly recommended!
Published 17 months ago by Heitor Lessa
Search Customer Reviews
Only search this product's reviews

Customer Discussions

This product's forum
Discussion Replies Latest Post
No discussions yet

Ask questions, Share opinions, Gain insight
Start a new discussion
Topic:
First post:
Prompts for sign-in
 

Search Customer Discussions
Search all Amazon discussions
   


Look for similar items by category