Python for Automating Information Security

Video description

Learn how to use the Python programming language to automate offensive and defensive information security tasks

About This Video

  • Learn individual information security techniques using Python
  • Use several powerful pre-built Python libraries for your own purposes
  • Build real information security tools in Python!

In Detail

The process of finding and eradicating an attacker is time-consuming and costs a lot, which hurts your organization. You need to write tools that will help you automate your defensive and offensive security. As a penetration tester, you need to evolve quickly. When off-the-shelf tools and exploits fall short, writing your own tool will help you safeguard your data.

In this course, learn how to leverage Python to perform routine tasks quickly and efficiently. You will automate log analysis and packet analysis with file operations, regular expressions, and analysis modules; interact with websites to collect intelligence; and develop TCP client and server applications for use in penetration testing. You will learn how to build automation tools for information security, and will hopefully find that these examples will help inspire you to design and build your own!

By the end of this course, you will have the skills and confidence you need to automate both offensive and defensive security techniques using Python; and have developed several small security tools and one large comprehensive penetration testing tool, all of which can be used in the real world.

Publisher resources

Download Example Code

Table of contents

  1. Chapter 1 : Reading, Modifying, and Testing an Exploit Script
    1. The Course Overview 00:05:02
    2. Setting Up Your Virtual Environment 00:03:20
    3. Finding an Exploit Script 00:02:03
    4. Understanding the Script 00:02:51
    5. Modifying the Script 00:04:50
    6. Testing the Script 00:03:17
  2. Chapter 2 : Analyzing a Packet Capture File
    1. Viewing a Packet Capture File in Wireshark 00:05:08
    2. Understanding Normal Traffic Patterns 00:04:44
    3. Writing a Python Script to Look for Malicious Network Traffic 00:04:47
    4. Writing a Python Script to Calculate a Network Traffic Baseline 00:04:52
    5. Writing a Python Script to Compare a Baseline Against Network Traffic 00:04:48
  3. Chapter 3 : Gathering Open-Source Intelligence
    1. What OSINT Is 00:05:13
    2. Enumerating Domain Names with Python 00:03:56
    3. What Is Google Dorking 00:03:16
    4. Automating Google Dorking with Python 00:03:28
    5. Web Directory Enumeration with Python 00:03:24
  4. Chapter 4 : Analyzing a Log File
    1. Reading a Log File 00:04:39
    2. Understanding Normal Log Messages 00:04:22
    3. Writing a Python Script to Look for Logs Indicating Malicious Activity 00:04:50
    4. Writing a Python Script to Calculate a Log Message Baseline 00:04:50
    5. Writing a Python Script to Compare a Baseline Against a Log File 00:03:58
  5. Chapter 5 : Writing a Python Replacement for Netcat
    1. What Is Netcat? 00:05:10
    2. Writing the Input Arguments 00:05:24
    3. Writing the Client 00:03:48
    4. Writing the Server 00:04:43
    5. Testing Your Program 00:04:46
  6. Chapter 6 : Collecting Network Packets Off the Wire
    1. Introduction to Passive Network Capture 00:04:27
    2. Writing a Python Packet Sniffer 00:04:13
    3. Capturing Plain-Text Credentials from Network Packets with Python 00:04:16
    4. Introduction to ARP Cache Poisoning 00:03:50
    5. Writing a Python ARP Cache Poisoner 00:05:02
  7. Chapter 7 : Building a Penetration Testing Tool
    1. Introduction to the Metasploit Framework 00:05:46
    2. Writing the Discovery Module 00:04:19
    3. Writing the Exploit Framework 00:05:13
    4. Stitching It All Together with an Interactive Command Shell 00:05:41
    5. Testing MSFPY 00:04:25

Product information

  • Title: Python for Automating Information Security
  • Author(s): Thomas McNeela
  • Release date: May 2020
  • Publisher(s): Packt Publishing
  • ISBN: 9781838828219