Python is a great language for learning, writing web applications, and manipulating data. However, Python can be used for security testing as well. In this series, we will explore the use of Python in such concepts as brute force password cracking, making SSH connections programmatically, creating socket connections and port scanner a particular host, banner grabbing from open ports, and more. If that sounds interesting to you, then please join us!
In this segment we're gonna give you
a quick look at what you can expect from
our upcoming Python for Security series.
Justin, could you do us the immense favor
of giving us some of the topics that we're
gonna encounter as refers to the series?
>> So there's a few things
that we're going to encounter.
Most of what we're going to
be doing is network related,
because Python already has some
built in network related modules.
The socket library, create a server,
create a client, two set server.
Also, maybe a little
bit of packet sniffing.
Moreover, we're gonna be looking at some
attacks to like various ports on your
machine, various services, particularly
your brute force attack to the SSH client.
>> Very cool.
We have a lot of different times that
we're doing certification based training.
We also do technical skills
based training as well.
Which one of those categories
would this series fall under?
>> This is most definitely a tech skill.
This is something where
a little bit of Python.
I'm interested in security.
How do those two come together?
This is not certification based.
It's more about, hey, I have this idea.
Let me kind of make it come to
fruition in the context of security.
>> And Justin, I always like to ask,
who is the intended audience for
this series, as well?
>> So the intended audience is, you should
probably have some experience with Python,
cuz that's kind of
assumed from the outset.
Otherwise, you're gonna be like,
I don't know what all of this is, right?
So, some programming experience in Python,
I'm not saying you have to be
an expert but you should have
a basic understanding of variables,
lists, classes, so on and so forth.
Moreover, you should have some basic
understanding of security principles, or
at least attacks that can be employed
against a particular node or individual.
>> All right, well Justin, that sounds
fantastic, and I know I'm looking
forward to it and it sounds like
that you might be interested in.
>> Well, we look forward to seeing
you in the upcoming series.