Home 0P3N Blog Python Programming for Hackers (Part 1) - Getting Started
Ready to Start Your Career?
Create Free Account
bjacharya s profile image
By: bjacharya
December 30, 2015

Python Programming for Hackers (Part 1) - Getting Started

By: bjacharya
December 30, 2015
bjacharya s profile image
By: bjacharya
December 30, 2015
Hi and welcome to this new how to series of student tutorials. My name is Bijay, and I'll be teaching you a complete series of Python Programming for Hackers. Part 1 is the introduction to the course outline and the set up process.

Well, first, why Python?

  • Python is my favorite programming language. Believe me, it's cool
  • With it's decreased complexity, increased efficiency and limitless third-party libraries, Python provides an excellent development platform to build our own tools, or, in ethical hackers terms, it's called offensive tools.
  • Python allows rapid development and testing - which are essential for ethical hackers, pentesters and security professionals.
  • Python is a Hackers' Language (I read it in TJ O' Connor's book) and I believe that. Definitely, Python is a Hackers' Language.
Who should read this training series?

  • Basically, I recommend this training series to beginners
  • Actually, this training series is for anyone who wants to learn Python and then aims to apply in the field of cybersecurity, pentesting or ethical hacking.
What will be covered in this training series?

  • Yes, we'll start with 'Hello World'. Then, we'll see some basics of Python programming. Such as,
    • Variables and it's types, Operators, Strings, Conditions and Loops.
    • Then we will go deeper and start playing with scripts of ethical hackers. Such as:
      • Penetration Testing with Python,
      • Web Analysis with Python,
      • Network Traffic Analysis with Python
      • Forensics Analysis
      • Wireless Vulnerabilities
      • Exploits
Along with the tutorial series, we'll write some scripts and utilize many of the built-in scripts/modules for port scanning, vulnerability assessment, geo-locating of criminals with IP addresses, different types of exploits, investigating with forensics toolkit, detecting malicious toolkits, browsing anonomously with Python and a lot more.

What are the Python Programming Requirements?

  • IDE for Python. You can get it here: www.python.org/downloads
  • We'll be using it in Windows and Kali Linux
  • With Kali Linux, we can use Pycrust or we can go to terminal and type Python, then we can use it that way
  • Except these 2 OS, if you have any other OS, you may manage them on your own.
  • We need third-party library files and set up tools. I'll not mention those tools now, because we'll be seeing those later in this tutorial series and we'll use them when we need them.
This is my own work :) P.S. I used the Python logo in the custom thumbnail, which I downloaded from python.org
Schedule Demo

Build your Cybersecurity or IT Career

Accelerate in your role, earn new certifications, and develop cutting-edge skills using the fastest growing catalog in the industry