Coding for Penetration Testers: Building Better Tools
Thumbnail 1Thumbnail 2Thumbnail 3

Coding for Penetration Testers: Building Better Tools

3.8/5
Product ID: 5469130
Secure Transaction
Frequently Bought Together

Description

Full description not available

Reviews

3.8

All from verified purchases

B**B

Exactly what you hoped for! Like new.

I bought it used and saved at least $35 or so, rather than buying the same book new from my school's bookstore. Worth the investment for me. Can't speak for every book they sell.

J**N

Good

Good but think of the first part of the book as just an introduction to python

M**W

Errors in examples

There's typos in the example scripts that prevent them from running. These are not excercises for the reader to catch the errors, but errors in the examples that are presented as how to do things.It's a programming textbook. That's unacceptable and should have been caught by editors.

A**R

If you are looking to begin pen-testing and have a solid understanding of tcp/ip this is a great book.

I expected a bit more depth. High level overviews of a few scripting languages with examples that are pen-test/information gathering focused. Touches on exploit code. If you are looking to begin pen-testing and have a solid understanding of tcp/ip this is a great book.

T**R

Boreing But Good

You can't write a book like this and have it be interesting, but it had good examples and easy to follow steps.

R**L

One Star

Absolute junk, the code and links do not work and the book is poorly written.

J**H

Five Stars

great buy

J**A

Huge disappointment

I have to say this has been the biggest disappointment of all security-related books that I ever purchased (there were dozens). It should be named "A quick glance at a few scripting languages".To give an example, Python is mentioned on 33 pages (that includes a few pages for scapy) where you'll be shown how to (hold your breath) send an ICMP packet. (I will not talk about PEP8 here).To drill a bit further, the chapter about Python lists is about (wait for it) - bitwise operations. Lists are only mentioned as a way of storing data for the given example which shows how you can use Python to calculate net & broadcast address from a CIDR notation (why would you want to use lists for that?). There is no meaningful mention of list indexing or slicing.The chapter about Python exceptions is just appaling.There is no explanation of "why" anywhere, just "what" and a little bit of "how". Also, no hint on where to look for further information.Real beginners might find this book interesting for getting a basic idea of how are scripting languages used (bash, Python, Perl, Ruby and PowerShell all get a really quick intro). But then they would get really confused towards the end of the book when they suddenly find authors throwing shellcode at vulnerable FTP server and using some terms that are mentioned very briefly: "EIP is called the Instruction pointer", "ESP points to stack area where you can see the stack", "as you can see, the EIP is now overwritten with 41414141 so the server is vulnerable". Is any beginner expected to understand this?I'm really struggling to see who is the intended audience. It does not give any explanation to beginners and is way too shallow for any penetration tester.

Common Questions

Trustpilot

TrustScore 4.5 | 7,300+ reviews

Imran F.

Very reliable shop with genuine products. Will definitely buy again!

2 weeks ago

Ayesha M.

The product exactly matches the description. Very satisfied with my purchase.

5 days ago

Shop Global, Save with Desertcart
Value for Money
Competitive prices on a vast range of products
Shop Globally
Serving over 300 million shoppers across more than 200 countries
Enhanced Protection
Trusted payment options loved by worldwide shoppers
Customer Assurance
Trusted payment options loved by worldwide shoppers.
Desertcart App
Shop on the go, anytime, anywhere.
₨1119

Duties & taxes incl.

Seychellesstore
1
Free Returns

30 daysfor PRO membership users

15 dayswithout membership

Secure Transaction

Trustpilot

TrustScore 4.5 | 7,300+ reviews

Zainab N.

Fantastic and great service. Shipping was faster than expected.

1 week ago

Vikram D.

The MOLLE sheath is of exceptional quality. Very happy with my purchase.

2 weeks ago

Coding For Penetration Testers Building Better Tools | Desertcart Seychelles