{"id":60035,"date":"2022-03-31T14:40:18","date_gmt":"2022-03-31T12:40:18","guid":{"rendered":"https:\/\/eiposgrados.com\/?p=60035"},"modified":"2022-04-05T17:54:11","modified_gmt":"2022-04-05T15:54:11","slug":"how-to-use-python-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/eiposgrados.com\/eng\/cybersecurity-blog\/how-to-use-python-in-cybersecurity\/","title":{"rendered":"How to use Python in cybersecurity?"},"content":{"rendered":"<p>In tasks related to cybersecurity we can use various programming languages. However, one stands out above the rest: <strong>Python<\/strong>. Used for\u00a0<a href=\"https:\/\/eiposgrados.com\/eng\/python-blog\/python-vs-c-vs-java\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>develop applications of all kinds<\/strong><\/a>, this language has many features that make it an excellent option for preparing solutions against cyber attackers.<\/p>\n\n\n\n<p><strong>Python Features<\/strong><\/p>\n\n\n\n<p>The first of them, which has made it a very popular programming language, is its simplicity. Is <strong>easy to understand and learn<\/strong> and at the same time it is very versatile, truly useful when creating prototypes and solutions.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full is-resized\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2022\/03\/stark-overflow.png\" alt=\"Stark Overflow\" class=\"wp-image-60036\" width=\"472\" height=\"487\" title=\"\" srcset=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2022\/03\/stark-overflow.png 874w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2022\/03\/stark-overflow-291x300.png 291w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2022\/03\/stark-overflow-768x792.png 768w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2022\/03\/stark-overflow-160x165.png 160w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2022\/03\/stark-overflow-123x127.png 123w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2022\/03\/stark-overflow-194x200.png 194w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2022\/03\/stark-overflow-24x24.png 24w\" sizes=\"(max-width: 472px) 100vw, 472px\" \/><figcaption>According to <em>Stack Overflow (Q&amp;A reference site for professional and amateur programmers)<\/em> Survey conducted with professional developers. 58,031 responses.<br><\/figcaption><\/figure><\/div>\n\n\n\n<p>It is also a <strong>powerful language<\/strong>, Has many <strong>bookstores<\/strong> They can be easily imported and this is more advantageous than trying to do it from scratch.<\/p>\n\n\n\n<h2 class=\"gb-headline gb-headline-914c87b9 gb-headline-text\"><strong>Python and Cybersecurity: tools<\/strong><\/h2>\n\n\n\n<p>In the case at hand, that of explaining the various uses that this <strong>programming language in cybersecurity<\/strong>, we can mention different<strong> tools<\/strong> that can be useful in your daily life:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>OSINT and Python techniques<\/strong><\/li><\/ul>\n\n\n\n<p>One of the best-known resources in the OSINT world is precisely the <em><a href=\"https:\/\/osintframework.com\" target=\"_blank\" rel=\"noreferrer noopener\">OSINT Framework<\/a><\/em> (<a href=\"https:\/\/osintframework.com\/\" target=\"_blank\" rel=\"noopener\">\/<\/a>).\u00a0<\/p>\n\n\n\n<p>It&#039;s about a <strong>online repository<\/strong> containing <strong>multitude of resources<\/strong> to carry out searches and collect information in open sources.&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>SpiderFoot<\/strong><\/li><\/ul>\n\n\n\n<p>It is one of the <em>frameworks<\/em> further <strong>complete OSINT techniques<\/strong>. It is developed in Python and supports more than <strong>300 integrations<\/strong> with services <em>on-line<\/em> for the collection of information in open sources. The official GitHub repository that is available <strong><a href=\"https:\/\/github.com\/smicallef\/spiderfoot\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a>.<\/strong> <\/p>\n\n\n\n<p>Other important tools that you will use quite frequently is <strong><a href=\"http:\/\/www.shodan.io\" target=\"_blank\" rel=\"noopener\">Shodan<\/a><\/strong>, known as \u201cthe <strong>hacker&#039;s google<\/strong>\u201d since it is a powerful search engine and its objective is to locate devices connected to the Internet, that is, from <em>routers<\/em>, devices <em>IoT<\/em>, security cameras, etc.<\/p>\n\n\n\n<p>The interesting thing about this tool is that it has an API that allows Ruby or Python developers to use it programmatically, something that is certainly extremely useful to a pentester.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Python and Nmap<\/strong><\/li><\/ul>\n\n\n\n<p>Nmap is one of the most common tools in the daily life of a <strong>pentester<\/strong>, has several libraries in Python which allows integration between said tool and the programming language. For example, &quot;<a href=\"https:\/\/pypi.org\/project\/python-nmap\/\" target=\"_blank\" rel=\"noopener\"><strong>python-nmap<\/strong><\/a>\u201d offers us great <strong>flexibility <\/strong>when executing <strong>custom scans<\/strong>. It allows you to run the scanning process with Nmap asynchronously, this means that you can run the scan in the background and continue normally with the execution of the script.<\/p>\n\n\n\n<p>You can study all the tools and techniques mentioned in the <strong>Master in Cybersecurity Management, Ethical Hacking and Offensive Security<\/strong> from the hand of the best professionals. You can become a <strong>cybersecurity expert<\/strong>.<\/p>","protected":false},"excerpt":{"rendered":"<p>Learn the features and tools that make Python the standard programming language used in cybersecurity. Click. <\/p>","protected":false},"author":90,"featured_media":60038,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[332,142],"tags":[],"class_list":["post-60035","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-ciberseguridad","category-blog"],"acf":[],"_links":{"self":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts\/60035","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/users\/90"}],"replies":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/comments?post=60035"}],"version-history":[{"count":0,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts\/60035\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/media\/60038"}],"wp:attachment":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/media?parent=60035"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/categories?post=60035"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/tags?post=60035"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}