SlideShare a Scribd company logo
Violent Python:
Python in the dark side
darkx
PyCON.tw 2013
About
● a.k.a. xatier
● 平凡無奇的大學生
● 喜好自由軟體和資訊安全技術
● Python 只是輔助 (?)
工商服務
晚點 18:00 BoF 八號場地
強者我學長 Dr. Ken 大大
●
講題『Mining Interest Topics from
Plurk by using Python』
http://j.mp/10VSNPt
工商服務
晚點 18:00 BoF 八號場地
強者我學長 Dr. Ken 大大
●
講題『Mining Interest Topics from
Plurk by using Python』
http://j.mp/10VSNPt
最常拿 Python 來 ...
We Love Python
●Easy to Learn
●Easy to Read
● Easy to Hack (?)
●Cross platform
●Builtin tools
●Libraries
“This (Programming), of course, is the
fundamental hacking skill. If you don't know any
computer languages, I recommend starting with
Python. It is cleanly designed, well documented,
and relatively kind to beginners. Despite being a
good first language, it is not just a toy; it is very
powerful and flexible and well suited for large
projects. ”
– How to become a hacker (ESR)
(compare to C) ….. “With today's machines
as powerful as they are, this is usually a bad
tradeoff — it's smarter to use a language that
uses the machine's time less efficiently, but your
time much more efficiently. Thus, Python.”
– How to become a hacker (ESR)
小試身手
decrypt
decrypt
import crypt
crypt.crypt(word, salt) -> string
word will usually be a user's password. salt is a 2-
character string
which will be used to select one of 4096 variations of
DES. The characters
in salt must be either ".", "/", or an alphanumeric
character. Returns
the hashed password as a string, which will be
composed of characters from
the same alphabet as the salt.
● Dictionary Attack
● /usr/share/dict/words
● GGvxb.e7YgnIg
decrypt
decrypt
decrypt
Brute force
● http://pvanhoof.be/files/bruteforce.c
● import itertools
Brute force
● http://pvanhoof.be/files/bruteforce.c
● import itertools
Z
APIs
● socket API 跟 C 用起來幾乎一模一樣
● ctypes 標準庫提供 C/dll/so 跨接的橋樑
● 物件、流程控制等可省下更多時間
Hacking Skype
●main.db
● 你想要的通通都在這邊 (?
● 聯絡人、聊天紀錄 ... 等
● Unix like 系統很棒的
Lots of tools
●
http://www.dirk-loss.de/python-tools.htm
scapy
dpkt
Immunity Debugger
IDAPython
Lldb (llvm's debugger)
…...
python-nmap
● http://xael.org/norman/python/python-nmap/
● Nmap 工具的 Python binding
● 搭配 IPython shell 一同服用
● GPL licensed
Inspired by
●Nicolle Neulist: Write your own tools with
python! Derbycon2012
●Gray Hat Python: Python Programming for
Hackers and Reverse Engineers
●Violent Python: A Cookbook for Hackers,
Forensic Analysts, Penetration Testers and
Security Engineers
Thank you
☺https://github.com/xatier/PyCON-demo

More Related Content

PDF
Hacking the Gateways
PDF
Micro Python で組み込み Python
PDF
The Postmodern Binary Analysis
PDF
CODE BLUE 2014 : Embedded Security in The Land of the Rising Sun by BEN SCHMI...
ODP
Learn python
PDF
Lowcode: Redoing NativeBoost Portably
PPT
Python for pentesters
PPTX
Js robotics
Hacking the Gateways
Micro Python で組み込み Python
The Postmodern Binary Analysis
CODE BLUE 2014 : Embedded Security in The Land of the Rising Sun by BEN SCHMI...
Learn python
Lowcode: Redoing NativeBoost Portably
Python for pentesters
Js robotics

What's hot (20)

ODP
BSides Algiers - Nmap Scripting Engine - Hani Benhabiles
PDF
The Simple Scheduler in Embedded System @ OSDC.TW 2014
PDF
Ostinato FOSS.IN 2010
PDF
NSC #2 - Challenge Solution
PDF
Writing an Ostinato Protocol Builder [FOSDEM 2021]
PDF
My talk on Piter Py 2016
PDF
Ostinato - Craft Packets, Generate Traffic [SharkFest '20]
PPTX
Reverse engineering with python
PDF
Why Rust? - Matthias Endler - Codemotion Amsterdam 2016
PDF
Make Your Own Developement Board @ 2014.4.21 JuluOSDev
PDF
[DSC] Introduction to Binary Exploitation
PPT
Rust Programming Language
PDF
Raspberry Pi + ROS
ODP
Perl Usage In Security and Penetration testing
PDF
Warp10: collect, store and manipulate sensor data - BreizhCamp - 2016 03-24
PDF
Metasepi team meeting #7: Snatch application on tiny OS
PDF
Frida Android run time hooking - Bhargav Gajera & Vitthal Shinde
PDF
Mikhail Belopuhov: OpenBSD: Where is crypto headed?
PDF
Profile all the things! - Capital Go 2017
PDF
What's new In Perl?
BSides Algiers - Nmap Scripting Engine - Hani Benhabiles
The Simple Scheduler in Embedded System @ OSDC.TW 2014
Ostinato FOSS.IN 2010
NSC #2 - Challenge Solution
Writing an Ostinato Protocol Builder [FOSDEM 2021]
My talk on Piter Py 2016
Ostinato - Craft Packets, Generate Traffic [SharkFest '20]
Reverse engineering with python
Why Rust? - Matthias Endler - Codemotion Amsterdam 2016
Make Your Own Developement Board @ 2014.4.21 JuluOSDev
[DSC] Introduction to Binary Exploitation
Rust Programming Language
Raspberry Pi + ROS
Perl Usage In Security and Penetration testing
Warp10: collect, store and manipulate sensor data - BreizhCamp - 2016 03-24
Metasepi team meeting #7: Snatch application on tiny OS
Frida Android run time hooking - Bhargav Gajera & Vitthal Shinde
Mikhail Belopuhov: OpenBSD: Where is crypto headed?
Profile all the things! - Capital Go 2017
What's new In Perl?
Ad

Similar to Violent python (20)

PPTX
Python for security professionals by katoh jeremiah [py con ng 2018]
PPTX
Python
PDF
Python for Application Integration and Development
PDF
PyCon Taiwan 2013 Tutorial
PDF
release_python_day1_slides_201606.pdf
PDF
Python for Penetration testers
PPTX
Introduction to python for cybersecurity pythonminna
PDF
Programming with Python - Basic
PDF
开源沙龙第一期 Python intro
PPTX
Overview of Python - Bsides Detroit 2012
PDF
Pythonanditsapplications 161121160425
PPTX
Python and its Applications
PPTX
How Python Empowers Ethical Hackers by Supriya Kumar Mitra
PPTX
PenTest using Python By Purna Chander
PDF
Python fundamentals - basic | WeiYuan
PDF
Python Fundamentals - Basic
PDF
Python Intro
PDF
2010 08-19-30 minutes of python
PDF
PYTHON PROGRAMMING FOR HACKERS. PART 1 – GETTING STARTED
PDF
Python for Linux System Administration
Python for security professionals by katoh jeremiah [py con ng 2018]
Python
Python for Application Integration and Development
PyCon Taiwan 2013 Tutorial
release_python_day1_slides_201606.pdf
Python for Penetration testers
Introduction to python for cybersecurity pythonminna
Programming with Python - Basic
开源沙龙第一期 Python intro
Overview of Python - Bsides Detroit 2012
Pythonanditsapplications 161121160425
Python and its Applications
How Python Empowers Ethical Hackers by Supriya Kumar Mitra
PenTest using Python By Purna Chander
Python fundamentals - basic | WeiYuan
Python Fundamentals - Basic
Python Intro
2010 08-19-30 minutes of python
PYTHON PROGRAMMING FOR HACKERS. PART 1 – GETTING STARTED
Python for Linux System Administration
Ad

More from Xatierlike Lee (8)

PDF
Topic 02 a - [misc 2] how to solve problems (xatier)
PDF
2013 社團迎新課程長簡報
PDF
[NCTU] [CCCA] vim rocks
PDF
[NCTU] [CCCA] Network Security II
PDF
[NCTU] [CCCA] Network Security I
PDF
Kick my mouse away
PDF
Brainfuck interpreter 分析新竹碼農0307
PDF
Tcfsh bootcamp day2
Topic 02 a - [misc 2] how to solve problems (xatier)
2013 社團迎新課程長簡報
[NCTU] [CCCA] vim rocks
[NCTU] [CCCA] Network Security II
[NCTU] [CCCA] Network Security I
Kick my mouse away
Brainfuck interpreter 分析新竹碼農0307
Tcfsh bootcamp day2

Recently uploaded (20)

PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Empathic Computing: Creating Shared Understanding
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Cloud computing and distributed systems.
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Electronic commerce courselecture one. Pdf
Chapter 3 Spatial Domain Image Processing.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Dropbox Q2 2025 Financial Results & Investor Presentation
Diabetes mellitus diagnosis method based random forest with bat algorithm
sap open course for s4hana steps from ECC to s4
Mobile App Security Testing_ A Comprehensive Guide.pdf
MYSQL Presentation for SQL database connectivity
Per capita expenditure prediction using model stacking based on satellite ima...
Empathic Computing: Creating Shared Understanding
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Unlocking AI with Model Context Protocol (MCP)
Cloud computing and distributed systems.
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
“AI and Expert System Decision Support & Business Intelligence Systems”
Encapsulation_ Review paper, used for researhc scholars
Programs and apps: productivity, graphics, security and other tools
Electronic commerce courselecture one. Pdf

Violent python