Python
"Hello! Everyone" welcome to this new blog..... What is python??...
Well, first, why Python?
Python is my favorite programming language. Believe me, it’s cool.
With it’s decreased complexity, increased efficiency and limitless third-party libraries, Python provides an excellent development platform to build our own tools, or, in ethical hackers terms, it’s called offensive tools.
Python allows rapid development and testing – which are essential for ethical hackers, pentesters and security professionals.
Python is a Hackers’ Language (I read it in TJ O’ Connor’s book) and I believe that. Definitely, Python is a Hackers’ Language.
Who should read this training series?
Basically, I recommend this training series to beginners
Actually, this training series is for anyone who wants to learn Python and then aims to apply in the field of cybersecurity, pentesting or ethical hacking.
What will be covered in this training series?
Yes, we’ll start with ‘Hello World’. Then, we’ll see some basics of Python programming. Such as,
Variables and it’s types, Operators, Strings, Conditions and Loops.
Then we will go deeper and start playing with scripts of ethical hackers. Such as:
Penetration Testing with Python,
Web Analysis with Python,
Network Traffic Analysis with Python
Forensics Analysis
Wireless Vulnerabilities
Exploits
Along with the tutorial series, we’ll write some scripts and utilize many of the built-in scripts/modules for port scanning, vulnerability assessment, geo-locating of criminals with IP addresses, different types of exploits, investigating with forensics toolkit, detecting malicious toolkits, browsing anonomously with Python and a lot more.
What are the Python Programming Requirements?
IDE for Python. You can get it here:www.python.org/downloads
We’ll be using it in Windows and Kali Linux
With Kali Linux, we can use Pycrust or we can go to terminal and type Python, then we can use it that way
Except these 2 OS, if you have any other OS, you may manage them on your own.
We need third-party library files and set up tools. I’ll not mention those tools now, because we’ll be seeing those later in this tutorial series and we’ll use them when we need them.
Comments
Post a Comment