Python

"Hello!  Everyone" welcome to this new blog..... What is python??...

 

Well, first, why Python?

Python is my favorite programming language. Believe me, it’s cool.

With it’s decreased complexity, increased efficiency and limitless third-party libraries, Python provides an excellent development platform to build our own tools, or, in ethical hackers terms, it’s called offensive tools.

Python allows rapid development and testing – which are essential for ethical hackers, pentesters and security professionals.

Python is a Hackers’ Language (I read it in TJ O’ Connor’s book) and I believe that. Definitely, Python is a Hackers’ Language.

 

Who should read this training series?

Basically, I recommend this training series to beginners

Actually, this training series is for anyone who wants to learn Python and then aims to apply in the field of cybersecurity, pentesting or ethical hacking.

 

What will be covered in this training series?

Yes, we’ll start with ‘Hello World’. Then, we’ll see some basics of Python programming. Such as,

Variables and it’s types, Operators, Strings, Conditions and Loops.

Then we will go deeper and start playing with scripts of ethical hackers. Such as:

Penetration Testing with Python,

Web Analysis with Python,

Network Traffic Analysis with Python

Forensics Analysis

Wireless Vulnerabilities

Exploits

Along with the tutorial series, we’ll write some scripts and utilize many of the built-in scripts/modules for port scanning, vulnerability assessment, geo-locating of criminals with IP addresses, different types of exploits, investigating with forensics toolkit, detecting malicious toolkits, browsing anonomously with Python and a lot more.

 

What are the Python Programming Requirements?

IDE for Python. You can get it here:www.python.org/downloads

We’ll be using it in Windows and Kali Linux

With Kali Linux, we can use Pycrust or we can go to terminal and type Python, then we can use it that way

Except these 2 OS, if you have any other OS, you may manage them on your own.

We need third-party library files and set up tools. I’ll not mention those tools now, because we’ll be seeing those later in this tutorial series and we’ll use them when we need them.

Comments

Popular posts from this blog

A single Tamil word Crash any Iphone Device

Google dork list in 2017

New Saturn Ransomawer