In my previous post I looked at the ways of using nmap and Python to scan hosts, and in this post I am going to look at outputting the results. But first a public service announcement: DO NOT USE THE BELOW INFORMATION TO ATTACK, MONITOR OR BREAK INTO ANY COMPUTER / NETWORK / DEVICE THAT … Continue reading Python and nmap: Controlling The Output (Python)
Category: Security
Python and nmap: Scanning For Hosts (Python)
nmap is a powerful software tool that can be used to scan a network for hosts, see what ports they have open and even try to identify what operating system the hosts have running. I previously created a basic port scanner in Python, but in this blog post I am going to look at using … Continue reading Python and nmap: Scanning For Hosts (Python)
Instant Messaging App With Vigenère Encryption (Python)
Over the last few weeks I have been looking at ciphers and encryption, which has included a Python program to brute force the Caesar cipher, Python to encrypt / decrypt with the Vigenère cipher , some Morse code and RSA Public Keys. With my recent looks into encryption, especially the look into the Vigenere Cipher, … Continue reading Instant Messaging App With Vigenère Encryption (Python)
Vigenère Cipher (Python)
Previously I looked at the Vigenère cipher, but I did not have a working Python example. After some thought and consideration I came to the realisation that the Vigenère cipher is pretty much just a Caesar cipher with a shift that changes each letter, which then allowed me to figure out how to make it … Continue reading Vigenère Cipher (Python)
RSA Public-Key Cryptography (Python)
I am currently undertaking the "Encryption & Cryptography" course on FutureLearn (https://www.futurelearn.com/courses/encryption-and-cryptography/) and looking at public-key cryptography, specifically today the RSA public-key method. RSA is named after Ron Rivest, Adi Shamir and Leonard Adleman (Rivest-Shamir-Adleman; RSA) and the details for the algorithm were first published in 1977. English mathematician, Clifford Cocks developed a similar system … Continue reading RSA Public-Key Cryptography (Python)
Vigenère Cipher
Named after French diplomat, Blaise de Vigenère, the Vigenère cipher built on the work / ideas of Giovan Battista Bellaso. Previously I have looked at the Caesar cipher and included a Python program that can brute force crack the cipher. The Caesar cipher can be easily broken either via frequency analysis of letters or via … Continue reading Vigenère Cipher
Brute Force Caesar Cipher (Python)
"The Caesar Cipher (Caesar Shift, Caesar’s Code) is a simple, easy to implement substitution cipher. The cipher is named after Julius Caesar. The cipher works by taking the letters of the message and then shifts the letter a defined space along the alphabet. For example a shift of 1 character would make a=b, b=c, c=d … Continue reading Brute Force Caesar Cipher (Python)
Nessus Essentials – Vulnerability Assessment: Installing Nessus
Vulnerability assessment tools are used to identify risks/threats that may cause security issues in a system. Today I am going to look at a vulnerability assessment tool from Tenable called Nessus Essentials, which can (manually or automatically) scan networks for vulnerabilities and then output reports. Nessus Essentials Nessus (https://www.tenable.com/products/nessus) offers a few different vulnerability assessment … Continue reading Nessus Essentials – Vulnerability Assessment: Installing Nessus
Using Ansible To Create And Manage Users (Linux / Raspberry Pi)
If you have multiple Linux devices (e.g. multiple Raspberry Pi computers) and multiple user accounts that need access to those devices (i.e. maybe a Code Club of pupils) and want their own user accounts on the devices it could be a lengthy process managing the accounts and devices. Which is where Ansible (https://www.ansible.com/) comes into … Continue reading Using Ansible To Create And Manage Users (Linux / Raspberry Pi)
Password Check (Python)
After discovering this week that someone had created a password checker I decided I would give the same idea a shot. For this project I am using information from the National Cyber Security Centre (NCSC) here in the UK. To read up on the information I recommend: https://www.ncsc.gov.uk/news/most-hacked-passwords-revealed-as-uk-cyber-survey-exposes-gaps-in-online-security https://www.ncsc.gov.uk/blog-post/passwords-passwords-everywhere https://www.ncsc.gov.uk/collection/passwords https://www.ncsc.gov.uk/collection/passwords/updating-your-approach ---- # geektechstuff # … Continue reading Password Check (Python)
You must be logged in to post a comment.