Python for Pentesters

Room Link: https://tryhackme.com/r/room/pythonforcybersecurityarrow-up-right

Subdomain Enumeration

Kali

nmap -A $VICTIM

Kali

subdns.py

Kali

Directory Enumeration

As it is often pointed out, reconnaissance is one of the most critical steps to the success of a penetration testing engagement. Once subdomains have been discovered, the next step would be to find directories.

The following code will build a simple directory enumeration tool.

dir.py

Kali

Network Scanner

Python can be used to build a simple ICMP (Internet Control Message Protocol) scanner to identify potential targets on the network. However, ICMP packets can be monitored or blocked as the target organization would not expect a regular user to “ping a server”. On the other hand, systems can be configured to not respond to ICMP requests. These are the main reasons why using the ARP (Address Resolution Protocol) to identify targets on the local network is more effective. netscan.py

Kali

Port Scanner

portscan.py

Kali

File Downloader

download.py

Kali

Hash Cracker

MD5

hash.py

Kali

SHA256

hash.py

Kali

Keyloggers

keylogger.py

Kali

SSH Brute Forcing

sshbruteforce.py

Kali

Last updated