Security and Privacy in a Networked World/Too easy to misuse: erinevus redaktsioonide vahel
WikiHaldur (arutelu | kaastöö) |
WikiHaldur (arutelu | kaastöö) Resümee puudub |
||
18. rida: | 18. rida: | ||
One of the strong points of Python is modularity - in addition to the pretty extensive standard library, one can link specific modules to his/her program to access a multitude of additional functions. | One of the strong points of Python is modularity - in addition to the pretty extensive standard library, one can link specific modules to his/her program to access a multitude of additional functions. | ||
... | |||
== Some examples == | |||
=== Simple port scanner === | |||
... | |||
=== Archive password cracker === | |||
... | ... |
Redaktsioon: 20. märts 2014, kell 22:21
Nothing special
Hollywood movies tend to suggest that it takes Dr. Evil or some other nasty genius to be a cybercriminal. While some of it may be true for some kinds of attacks as well as for some well-defended targets, it is surprisingly simple to achieve significant results. Today's topic was inspired by the book Violent Python by TJ O'Connor - but similar easy recipes can also be found online.
But first, we need to learn a bit more about Python.
Python (continued)
Strings
Manipulation of strings (textual values) is a common task for security-related scripts in Python - e.g. a web page URL (web address), an IP address or a serial number are all handled as strings. Finding, extracting and relocating substrings (e.g. replace the last block of an IP address with another) are all common.
http://docs.python.org/2/library/stdtypes.html#string-methods
...
Modules
One of the strong points of Python is modularity - in addition to the pretty extensive standard library, one can link specific modules to his/her program to access a multitude of additional functions.
...
Some examples
Simple port scanner
...
Archive password cracker
...