Penetration testing

Python for active defense: Network

Python can be used for traffic collection, protocol decoding, and burning in a decoy when it comes to network defense.

Python for active defense: Decoys

Python can be a valuable resource when using decoys and pursuing active defense against cyberthreats.

How to write a port scanner in Python in 5 minutes: Example and walkthrough

What is a port scanner and how does it work? Learn by writing your own basic Python port scanner script in this walkthrough from Keatron Evans.

Using Python for MITRE ATT&CK and data encrypted for impact

The impact tactic in the MITRE ATT&CK framework focuses on how an attacker can cause harm to a target organization.

Explore Python for MITRE ATT&CK exfiltration and non-application layer protocol

Detecting data exfiltration is important when protecting an organization against a cyberattack.

Explore Python for MITRE ATT&CK command-and-control

Python can be used to implement command and control in a variety of different ways when it comes to using encrypted channels and protocol tunneling.

Explore Python for MITRE ATT&CK email collection and clipboard data

It is possible to collect data from a number of different sources, including the system clipboard and local repositories of emails, by using Python.

Explore Python for MITRE ATT&CK lateral movement and remote services

You can explore through Python how exploitation of admin shares and web session cookie hijacking can be used to achieve remote hijacking.

Explore Python for MITRE ATT&CK account and directory discovery

Python can use account and directory discovery to find user data such as accounts, which is valuable to attackers.

Explore Python for MITRE ATT&CK credential access and network sniffing

Python is used to access credentials in many ways, including extracting them from web browsers’ credential caches and sniffing network traffic.