Talk Python To Me

#37: Python Cybersecurity and Penetration Testing

Dec 8, 2015
Ask episode
Chapters
Transcript
Episode notes
1
Introduction
00:00 • 2min
2
How I Got in a Program in Python
02:09 • 2min
3
How I Got Started in Python
04:24 • 4min
4
Grey Hat Python: A Low Level Reverse Engineering and Exploit Development Guide
08:51 • 2min
5
The Two Biggest Problems You Can Introduce Into Your Code
10:23 • 4min
6
How to Avoid SQL Injection Vulnerabilities
13:58 • 5min
7
How to Enumerate Data in a Web Application
18:30 • 3min
8
Black Hat Python: A Traditional Penetration Test Approach
21:09 • 2min
9
How to Detect a Trojan in a Virtual Machine
22:57 • 3min
10
How to Use Raw Sockets in Python
25:41 • 2min
11
Python Framework to Understand Malware
27:21 • 3min
12
How to Analyze Malware in Python
30:26 • 4min
13
The Importance of Open Source Intelligence
34:30 • 3min
14
How to Identify ISIS Supporters on Twitter
37:31 • 4min
15
How to Use Python to Solve a Semi-Automatic Problem
41:38 • 2min
16
How to Automate Open-Source Intelligence
44:05 • 4min
17
The Most Unusual or Entertaining Thing I've Run Sights Across the Space
47:46 • 2min
18
The Importance of Michael Pazell in Cyber Security
50:03 • 3min
19
The Importance of Fear in the Security Industry
52:48 • 3min
20
How to Write Python Code
55:32 • 2min
21
Talk Python to Me: Secrets From the Future
57:28 • 4min
22
Secrets From the Future With a Knife
01:01:24 • 2min