Python for Penetration Testing

This page keeps all original information and links. Japanese page

Training →Wireshark Open Seminar Education Partners →Books →Conference Speaking →Certifications
VirtualizationQt DevelopmentOpen Seminar ArchiveWireshark Track RecordCybersecurity Track Record Information Processing Engineer Exam
Seminar List Past Seminars
Python-1
Course code: Python-1
Python
for penetration testing
BurpSuitePythonTemp
Seminar name/code
Date/time
Overview

[Python-1] Python
for penetration testing (code:Python-1)

2Days
(10:00-18:00)

Using the Python language on Windows and Kali LinuxEnvironment, you will be able to create a
PythonEnvironment, install libraries, update packages,
create, modify, and run simple scripts, and apply them to
security tools.
Enables you to create security tools with Python and
check cybersecurity.

Textbook and equipment used
Lecturer
Purpose

★Distribution
・ Black Hat Python 2nd Edition
・PythonEnvironment
(Windows/Kali)
・Resume material
・CD-ROM
・USB memory
・Ikeriri bag
・Ikeriri magnet

★Lunch box

★Equipment used
・USB pen test tool
Hardware security equipment
・LAN cable/router
・2 PCs per person (Kali/Windows)
・Network Environment
・Whiteboard/projector


MegumiTakeshita
Megumi Takeshita

Ikeriri★Network Service Co., Ltd.

learning-photo1


Read the plain Python script so you can roughly understand what it's doing.
Create a PythonEnvironment, install and update packages in Windows/Kali LinuxEnvironment
Allows you to switch and update multiple environments, use libraries, and check APIs.

Learn the basics of creating security tools by creating Python scripts.

Enables you to create cybersecurity tools using Python code and libraries.

*The seminar focuses on GUI programming for Windows and Kali Linux. Although it is not impossible for people to have no experience with Python, it is aimed at people who are familiar with some computer language.
We also recommend that you have basic knowledge of LAN and TCP/IP.

(Please note) In this seminar, you will learn cyber security attacks and countermeasures in a closed environment for practical training.Actually, hacking the external Internet violates the Unauthorized Access Act, as well as criminal and civil laws, and may be punished. This seminar is strictly a seminar to learn about cyber security attacks and take practical countermeasures. Please confirm and agree to this

Seminar details New

WING IDE Setup


Python network processing

TCP client

UDP client
TCP server
NetCat replacement
TCP proxy creation
SSH by Paramiko
SSH tunnel

Creating a UDP host discovery tool
Packet capture
IP layer decoding
ICMP decoding

Email information acquisition
ARP cache poisoning
Processing of Pcap


Utilizing URLLIB
Utilizing open source MAP
Brute force file path exploration
Brute force HTML form authentication

Utilizing BurpProxy

Keylogging
Screenshot
Shellcode execution
Sandbox Environment detection

Process monitor creation
Windows token privileges
Code injection in Windows Environment


Process automation
Password hash
Code insertion
Seminar List Past Seminars
Training →Wireshark Open Seminar Education Partners →Books →Conference Speaking →Certifications
VirtualizationQt DevelopmentOpen Seminar ArchiveWireshark Track RecordCybersecurity Track Record Information Processing Engineer Exam

Copyright Ikeriri Network Service Limited,All Rights Reserved.

English articles of incorporation Privacy policy site map search inquiry