Violent Python

Violent Python, 1st Edition

A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

Violent Python, 1st Edition,ISBN9781597499576





235 X 191

Discover how to use Python to exploit systems and build effective pen testing tools to defend your system from attackers.

Print Book + eBook

USD 59.94
USD 99.90

Buy both together and save 40%

Print Book


In Stock

Estimated Delivery Time
USD 49.95

eBook Overview

VST (VitalSource Bookshelf) format

DRM-free included formats : EPUB, Mobi (for Kindle), PDF

USD 49.95
Add to Cart

Key Features

- Demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts.

- Write code to intercept and analyze network traffic using Python. Craft and spoof wireless frames to attack wireless and Bluetooth devices.

- Data-mine popular social media websites and evade modern anti-virus.


Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker’s tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus.


Penetration Tester, Forensic Analysts, IT Security Professionals (Security Auditors, Security Engineers, Compliance Specialists, etc.)

Violent Python, 1st Edition

Trade marks



Lead Author – TJ O’Connor

Contributing Author Bio – Rob Frost

Technical Editor Bio – Mark Baggett





Chapter 1. Introduction

Introduction: A Penetration Test with Python

Setting Up Your Development Environment

The Python Language

Your First Python Programs

Chapter Wrap-Up


Chapter 2. Penetration Testing with Python

Introduction: The Morris Worm—Would it Work Today?

Building a Port Scanner

Building an SSH BotNet with Python

Mass Compromise by Bridging FTP and Web

Conficker, Why Trying Hard is Always Good Enough

Writing Your Own Zero-Day Proof of Concept Code

Chapter Wrap Up


Chapter 3. Forensic Investigations with Python

Introduction: How Forensics Solved the BTK Murders

Where Have You Been?—Analysis of Wireless Access Points in the Registry

Using Python to Recover Deleted Items in the Recycle Bin


Investigating Application Artifacts with Python

Investigating iTunes Mobile Backups with Python

Chapter Wrap-Up


Chapter 4. Network Traffic Analysis with Python

Introduction: Operation Aurora and How the Obvious was Missed

Where is that IP Traffic Headed?—A Python Answer

Is Anonymous Really Anonymous? Analyzing LOIC Traffic

How H D Moore Solved the Pentagon’s Dilemma

Storm’s Fast-Flux and Conficker’s Domain-Flux

Kevin Mitnick and TCP Sequence Prediction

Foiling Intrusion Detection Systems with Scapy

Chapter Wrap Up


Chapter 5. Wireless Mayhem with Python

Introduction: Wireless (IN)Security and the Iceman

Setting up Your Wireless Attack Environment

The Wall of Sheep—Passively Listening to Wireless Secrets

Where Has Your Laptop Been? Python Answers

Intercepting and Spying on UAVs with Python

Detecting FireSheep

Stalking with Bluetooth and Python

Chapter Wrap Up


Chapter 6. Web Recon with Python

Introduction: Social Engineering Today

Using the Mechanize Library to Browse the Internet

Scraping Web Pages with AnonBrowser

Research, Investigate, Discovery

Anonymous Email

Mass Social Engineering

Chapter Wrap-Up


Chapter 7. Antivirus Evasion with Python

Introduction: Flame On!

Evading Antivirus Programs

Verifying Evasion

Wrap Up



Quotes and reviews

"An information security specialist with the US Army, O'Connor introduces the hacker's programming language Python to new users, and describes some advanced features to those who already know it."--Reference and Research Book News, August 2013
"A quick glance at [the authors] collective credentials and experience undoubtedly creates high expectations for this title… The end result is that the book demonstrates how powerful just a few dozen lines of Python code can be… useful tips and tricks will surely be acquired simply by working through the exercises."--The Ethical Hacker Network,
February 27, 2013
"Violent Python is an excellent resource that develops and enhances a diverse set of security-related Python skills. The book also serves as a great reference, where recipes could be quickly implemented to address specific issues as they arise. Readers who are actively working in an InfoSec position will likely be able to put their newly acquired skills to use immediately, and those looking to break into the field will acquire skills that differentiate themselves from others who are dependent on prebuilt tools. This title is highly recommended for anyone who wants to improve his or her Python skills within the InfoSec realm."--The Ethical Hacker Network, February 27, 2013
"When it comes to Python and penetration testing, TJ O'Connor is the grand Python master. This is the book that keeps on giving. From building penetration testing Python scripts, to antivirus-evading penetration testing malware, to interrogating the Windows Registry and investigating other forensic artifacts...O'Connor masterfully walks the reader from basic to advanced penetration testing techniques with sample code throughout."--Ove Carroll, SANS Certified Instructor, Co-Author of SANS Forensics 408 - Windows In Depth
"Violent Python is chalked full of practical examples and is for all security professionals. It covers the spectrum - knowledge for pen testers to forensic analysts, beginner to advanced and offensive to defensive tasks. If you are involved in information security and are looking for a Python book, this is an excellent source."--James Shewmaker, Security Analyst, Bluenotch Corporation
"The best hackers know when to write their own tools. Violent Python is a very relevant collection of examples to seed your personal hacking toolbox. From offensive actions to digital forensics, this book has useful bits for everyone."--Raphael Mudge, Creator of Armitage

Free Shipping
Shop with Confidence

Free Shipping around the world
▪ Broad range of products
▪ 30 days return policy

Contact Us