🔐
SecWiki
  • Home
  • General
    • Interesting Links
      • Curriculum
    • Pentest Labs, Wargames Sites
      • How To Vulnhub with VirtualBox
  • Network Pentest
    • Courses
      • TCM - Zero to Hero
        • Week 1: Setup
          • ipsweep.sh
        • Week 2: Python 101
          • python101.py
          • bof.py
        • Week 3: Python 102
          • python102.py
          • scanner.py
        • Week 4: Passive OSINT
        • Week 5: Scanning Tools & Tactics
          • nmap
          • Nessus
          • msfconsole
        • Week 6: Enumeration
        • Week 7: Exploitation, Shells, and Some Credential Stuffing
        • Week 8: LLMNR/NBT-NS Poisoning
        • Week 9: NTLM
        • Week 10: MS17-010, GPP/cPasswords, and Kerberoasting
        • Week 11: File Transfers, Pivoting, Reporting
        • Commands
      • Penetration Testing Student (PTS)
      • OSCP Study
    • Recon
      • OSINT
    • Enumeration
      • Samba Shares
      • ProFtpd
    • Gaining Access
      • Reverse Shells
    • Privilege Escalation
      • Meterpreter
      • Spawning a TTY Shell
      • Reverse Shell Cheat Sheet
      • Cracking Hashes
      • Restricted Linux Shell Escape
      • Linux Privilege Escalation
        • lxd
        • sytemctl
      • Windows Privilege Escalation
        • Active Directory
          • What is AD?
        • User Enumeration
    • Post Exploitation
      • Cleanup
      • Maintaining Access
      • Pivoting
      • File Transfers
      • Covering Tracks
    • Vulnerabilities Checklist
    • Report Writing
  • Web App Pentest
    • Tools
      • Burp Suite
      • THC-Hydra BruteForce
    • Injection
      • SQL Injection
    • Broken Authentication
    • Sensitive Data Exposure
      • SQLite3
    • XML External Entity
      • XML Background
      • XPath Injection
    • Broken Access Control
    • Security Misconfiguration
    • Upload/Download
      • Download Bypass: Poison Null Byte
    • XSS
      • DOMXSS
      • Persistent XSS
      • Reflected (Client-side) XSS
      • Data URLs
    • Insecure Deserialization
    • Components with Known Vulnerabilities
    • Insufficient Logging and Monitoring
    • Server-Side Request Forgery (SSRF)
  • CTF
    • Intro to CTF
    • Forensics
      • Challenges
    • Steganography
    • Reverse Engineering
    • Tools
  • Network Security
    • Courses
      • Sec+
      • IBM Cybersecurity Analyst Professional Certificate
      • ISCI CNSS Course
        • Introduction to Network Security
          • Network Basics
          • Basic Network Utilities
          • The OSI Model
          • Threat Classification
          • Security Terminology
          • Approaches of Network Security
          • Law and Network Security
        • Types of Attacks
          • Denial of Service Attacks
          • Buffer Overflow Attacks
          • IP Spoofing
          • Session Hijacking
        • Fundamentals of Firewalls
          • What is a Firewall
          • Firewall Types
          • Firewall Implementation
          • Proxy Servers
          • Windows Firewalls
          • Linux Firewalls
        • Intrusion-Detection Systems
          • IDS Concepts
          • Components and Processes of IDS
          • Implementing IDS
          • Honeypots
        • Fundamentals of Encryption
          • The History of Encryption
          • Modern Encryption Methods
          • Windows and Linux Encryption
          • Hashing
          • Cracking Passwords
        • Virtual Private Networks (VPN)
          • Introduction to VPN
          • VPN Protocols
          • IPSec
          • SSL/TLS
          • VPN Solutions
        • Operating System Hardening
          • Configuring Windows
          • Configuring Linux
          • Operating System Patches
        • Virus Attacks and How to Defend
          • Virus Types and Attacks
          • Virus Scanners
          • Antivirus
          • Virus Infection and Identification
          • Trojan Horses
          • Spyware or Adware
        • Security Policies
          • User Policies Definition
          • System Administration Policies
          • Access Control
        • Assessing System Security
          • Risk Assessment
          • Conducting an Initial Assessment
          • Probing the Network
          • Vulnerabilities
          • Documenting Security
        • Security Standards
          • ISO Standards
          • NIST Standards
          • General Data Protection Regulation (GDPR)
          • PCI DSS
        • Physical Security and Recovery
          • Physical Security
          • Disaster Recovery
          • Fault Tolerance
        • Attackers Techniques
          • Hacking Preparation
          • The Attack Phase
          • Hacking Wi-Fi
    • The Web
    • The OSI Model
    • Malware Traffic Analysis with Wireshark
  • Digital Forensics
    • Autopsy - open-source digital forensics platform
  • Exploit Dev/Analysis
    • Code Review
      • Tools
    • Buffer Overflows
    • Static Analysis
      • Antivirus Scanning
      • Hashing
      • File strings
      • Packed and Obfuscated Malware
        • Demo: UPX
      • Portable Executable File Format (PE)
        • Tools
        • Linked Libraries and Functions
        • PE File Headers and Sections
  • Shell
    • ./missing-semester
      • Course overview + the shell
      • Shell Tools and Scripting
      • Editors (Vim)
      • Data Wrangling
      • Command-line Environment
    • Bash Tricks
    • .bashrc
    • Random Commands
      • sed
  • Hardware
    • NAND2Tetris
      • Boolean Functions and Gate Logic
      • Boolean Arithmetic and the ALU
      • Memory
      • Machine Language
      • Computer Architecture
      • Assembler
  • Other
    • K8s
      • Chapter 1: From Monolith to Microservices
      • Chapter 2: Container Orchestration
      • Chapter 3: Kubernetes
      • Chapter 4: Kubernetes Architecture
Powered by GitBook
On this page

Was this helpful?

  1. Network Pentest
  2. Courses
  3. TCM - Zero to Hero
  4. Week 2: Python 101

python101.py

#!/bin/python3

#Print string
print("Strings and things:")
print('Hello, world!')
print("""Hello, this is
a multi-line string""")
print("This is" +" a string")

print('\n') #new line

#Maths
print("Math time:")
print(50+50) #add
print(50-50) #sub
print(50*50) #mult
print(50/50) #divide
print(50 +50 - 50 * 50 /50) #PEMDAS
print(50 ** 2) #exponents
print(50 % 6) #modulo
print(50 // 6) #number without remainder

print('\n') #new line

#Variables & Methods
print("Variables and Methods:")
quote = "All is fair in love and war"
print(len(quote)) #length
print(quote.upper()) #uppercase
print(quote.lower()) #lowercase
print(quote.title()) #title

name = "Heath"
age = 29 #int int(29) <-- declare as integer
gpa = 3.7 #float float(3.7)

print(int(age))
print(int(gpa)) #does not round

print("My name is: " + name + " and I am " + str(age)  + " years old.")

age += 1 #increment
print (age)
print('\n') #new line
#Functions
print("Functions:")
def who_am_i():
	name = "Heath"
	age = 29
	print("My name is: " + name + " and I am " + str(age)  + " years old.")
who_am_i()

#adding in params
def add_one_hundred(num):
	print(num + 100)

add_one_hundred(100)

def add(x,y):
	print(x+y)
add(7,7)
add(305,207)
#using return
def multiply(x,y):
	return x * y
print(multiply(5,5))

def sqr_root(x):
	return x ** .5
print(sqr_root(64))

print()

#boolean expressions (True or False)
print("Boolean expressions:")
bool1 = True
bool2 = 3*3 == 9
bool3 = False
bool4 = 3*3 != 9
print(bool1,bool2,bool3,bool4)
print(type(bool1))
bool5 = "True"
print(type(bool5))

print()

#Relational and Boolean Operators
gt = 7 > 5
lt = 5 < 7
gte = 7 >= 7
lte = 7 <=7
print(gt,lt,gte,lte)

test_and = (7 > 5) and (5 < 7)
test_or = (7 > 5) or (5 < 7)
test_not = not True

print(test_and, test_or, test_not)
print()

#Conditionals
print("Conditionals")
def soda(money):
	if money >= 2:
		return "Soda!"
	else:
		return "no soda :("
print(soda(1) + " - " + soda(2))

def alcohol(age,money):
	if(age>=21) and (money >= 5):
		return "tipsy"
	elif (age>=21) and (money < 5):
		return "need money"
	elif (age < 21) and (money>=5):
		return "need years"
	else:
		return "need money and years on ya"
print(alcohol(25,5))
print(alcohol(15,8))
print(alcohol(21,4))
print(alcohol(18,2))
print()

#Lists
print("Lists:")
movies = ["The Hangover", "Hot Shots", "Airplane", "The Exorcist"]
print(movies[0])
print(movies[0:2]) #elements 0 and 1 (up to but not including 2nd element)
print(movies[1:]) #slice, 1st element onward
print(movies[:1]) #slice, up to the 1st element (just the 0th element)
print(movies[-1]) #takes last item (underflow)
print(len(movies))

movies.append("JAWS")
print(movies)

movies.pop() #removes last item in list
print(movies)

movies.pop(1) #removes 2nd item in list (Hot Shots)
print(movies)

movies = ["The Hangover", "Hot Shots", "Airplane", "The Exorcist"]
person = ["Heath", "Jake", "Leah", "Jeff"]
combined = zip(movies, person)
print(list(combined))
print()

#Tuples
print("Tuples have parentheses, not brackets and cannot change") #immutable
grades = ("A","B","C","D","F")
print(grades[1])
print()

#Looping
print("For loops - start to finish of iterate:")
vegetables = ["cukes","spinach","cabbage"]
for x in vegetables:
	print(x)
print("While loops - execute as long as true:")
i = 1
while i < 10:
	print(i)
	i+=1





PreviousWeek 2: Python 101Nextbof.py

Last updated 4 years ago

Was this helpful?