In this third installment of #TripwireBookClub, we look at “Gray Hat Python,” written by Justin Seitz and published by No Starch Press. I had the opportunity to briefly meet Justin at CanSecWest the year this book was published, which only increased my interest in the book and ensured my preorder. I read it back then (2009), and now, nine years later, I could definitely stand to read it again.
However, having read it in the past, I presented it for a book club but did not reread it. Seeing the reviews from members of VERT, I feel that I did myself a disservice, but I also feel like I want to hold out hope that we might see a second edition that modernizes the book before I delve into it again.
I remember that I looked forward to days when I could open IDA Pro or Immunity Debugger at work, and I found reasons to open them at night when I got home. Python was my primary programming language for both personal and professional development, and this book was everything I wanted in new reading material. I think one of the reasons I did not read the book is because looking back through rose-colored glasses, this was the perfect book.
I suspect in many ways it still is, as dated as it may be, but here’s what others within VERT had to say.
Reading Justin Seitz’s book “Gray Hat Python” was an absolute pleasure. The book is a bit old, as it was published in 2009. However, most of the tools and techniques illustrated in the book are still very relevant for reverse engineers and pentesters.
Justin does a great job at providing just enough background information for each topic, and the scope of the writing (Read more...)
*** This is a Security Bloggers Network syndicated blog from The State of Security authored by Tyler Reguly. Read the original post at: https://www.tripwire.com/state-of-security/vert/tripwirebookclub-gray-hat-python/