Paperback: 288 pages
Publisher: Syngress; 1 edition (November 22, 2012)
Product Dimensions: 7.5 x 0.6 x 9.2 inches
Shipping Weight: 14.4 ounces (View shipping rates and policies)
Average Customer Review: 4.3 out of 5 stars See all reviews (85 customer reviews)
Best Sellers Rank: #15,370 in Books (See Top 100 in Books) #11 in Books > Computers & Technology > Networking & Cloud Computing > Network Security #19 in Books > Computers & Technology > Internet & Social Media > Hacking #20 in Books > Textbooks > Computer Science > Networking
Violent python is an introductory level book on python with a introductory look at security concepts in general. It is great for those who are new to the language and would like example use cases of simplistic security tools, but not for those who want to understand Python, deeply understand the security concepts covered, or using python for reliable tools.Problems I had:1.) This book is about python libraries and interacting with them and other programs. It is not about understanding the attack and implementing them in Python. Sure, some may be required for ease to the beginner when it comes to forensics, communicating with ssh, or integrating with other tools for complex protocols like SMB, but anything else is really not fair to those who may not be able to use the library, who have problems and need to understand why, or those who want to understand what is happening on a lower level. Examples:1a.) Use ftplib for your ftp bruteforcer.1b.) Use zipfile to crack zip archives.1c.) Use os to send metasploit exploit code (your own 'conficker')/os to use msfpayload to bypass a/v.1d.) Use smtplib to communicate with smtp (regardless of the functions being ironically similiar to the real commands).The problem with this is it doesn't teach you how these libraries work. For example, one should show the person how to interact with FTP with the sockets library, what to send, what to look for, and then show them the easy libraries. As previosly stated, it also doesn't prepare them for issues (like programs that don't like complying with rfc standards).2.) More exception handling. The socket code is not helpfully handled on all stages of attempted connection.
TL;DR - go directly to the conclusion.This book is really weird. It shows since the beginning its nature, as stated by the book itself: a cookbook. A set of recipes to do something effectively, one would expect. It is, instead, a series of examples of how replicating some pretty old attack in a pretty bad manner. The reasons why I say this?- the code is bad: - it looks like "the Python antipattern cookbook", that is "how not to code in Python" (too long list of examples here, but some: exception handling generally absent and when present it's a "catch-all", namespace pollution, old-style classes) - it completely ignores best practices, code reuse, multithreading, isolation, synchronization, good design- the attacks are very old: - everything you learn in this book is pointless nowadays- the rationale and explanations are generally absent: - it doesn't explain why something is done in that way: it just goes "we do this, and this, and this, et voilà!". The consequence is that it's useless for a beginner since he can't learn anything new, and it's useless for an expert, since it's too basic to be useful - there's no troubleshooting at all: what if something doesn't work out of the box?
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers Python: PYTHON CRASH COURSE - Beginner's Course To Learn The Basics Of Python Programming In 24 Hours!: (Python, Python Programming, Python for Dummies, Python for Beginners, python crash course) Python: Learn Python In A DAY! - The Ultimate Crash Course to Learning the Basics of Python In No Time (Python, Python Course, Python Development, Python Books, Python for Beginners) Hacking: How to Hack Computers, Basic Security and Penetration Testing (Hacking, How to Hack, Hacking for Dummies, Computer Hacking, penetration testing, basic security, arduino, python) Hacking: Basic Security, Penetration Testing and How to Hack (hacking, how to hack, penetration testing, basic security, arduino, python, engineering) PYTHON: Python in 8 Hours, For Beginners, Learn Python Fast! A Smart Way to Learn Python, Plain & Simple, Learn Python Programming Language in Easy Steps, A Beginner's Guide, Start Coding Today! Python: Learn Web Scraping with Python In A DAY! - The Ultimate Crash Course to Learning the Basics of Web Scraping with Python In No Time (Web Scraping ... Python Books, Python for Beginners) Python: Learn Python FAST - The Ultimate Crash Course to Learning the Basics of the Python Programming Language In No Time (Python, Python Programming, ... (Learn Coding Fast with Hands-On Project 7) Hacking: Beginner's Guide to Computer Hacking, Basic Security, Penetration Testing (Hacking, How to Hack, Penetration Testing, Basic security, Computer Hacking) Programming #45: Python Programming Professional Made Easy & Android Programming In a Day! (Python Programming, Python Language, Python for beginners, ... Programming Languages, Android Programming) Black Hat Python: Python Programming for Hackers and Pentesters Google Hacking for Penetration Testers, Third Edition Violent Delights, Violent Ends: Sex, Race, and Honor in Colonial Cartagena de Indias The Ultimate Guide to WordPress Security: Secure and protect your WordPress website form hackers and protect your data, get up to date security updates Hackers vs. Security Pros: A Security Manager's Playbook (The CTO Playbook 1) Python: Learn Python in One Day and Learn It Well. Python for Beginners with Hands-on Project. (Learn Coding Fast with Hands-On Project Book 1) Programming Raspberry Pi 3: Getting Started With Python (Programming Raspberry Pi 3, Raspberry Pi 3 User Guide, Python Programming, Raspberry Pi 3 with Python Programming) The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy (Syngress Basics Series) Home Security: Top 10 Home Security Strategies to Protect Your House and Family Against Criminals and Break-ins (home security monitor, home security system diy, secure home network)