Paperback: 192 pages
Publisher: No Starch Press; 1 edition (December 14, 2014)
Product Dimensions: 7 x 0.6 x 9.2 inches
Shipping Weight: 15.2 ounces (View shipping rates and policies)
Average Customer Review: 4.2 out of 5 stars See all reviews (70 customer reviews)
Best Sellers Rank: #11,765 in Books (See Top 100 in Books) #4 in Books > Computers & Technology > Security & Encryption > Viruses #8 in Books > Computers & Technology > Security & Encryption > Privacy & Online Safety #8 in Books > Computers & Technology > Networking & Cloud Computing > Network Security
I just got this book in the mail earlier today and couldn't help but sit down and read through the entire thing. Starting from chapter two, author Justin Seitz walks you through the creation of classic networking tools in the popular Python programming language (Chapter 1 focuses on setting up your environment). From netcat to proxies to SSH tunnels, the amount of information packed in is amazing. He then delves deeper into the world of network analysis and shows you how to write your own sniffers leading to a pared-down nmap implementation. The best part is that you learn all of this while staying essentially crippled- Seitz doesn't just introduce one of Python's many libraries and just say "Play", he walks your though all the nitty gritty details along the way. It's great.He then pulls you from the dark undergrounds of low(ish) level socket programming to show you what Python can do against application-layer targets. You begin with learning to bruteforce directories and image locations before quickly moving to extending Burp Suite to fit whatever your needs may be. From there, you get into some of the heavier materials by taking another step further from networks to create command and control points for a trojan that you eventually get around to writing. Keylogging, surreptitious screenshots, and even rooting techniques become your new playground.There's more, naturally, but I feel as though you can get the point clearly enough looking through the table of contents. Besides, I wouldn't want to spoil all the fun.