Hack Like a Pro: Python Scripting for the Aspiring Hacker, Part 1

Python Scripting for the Aspiring Hacker, Part 1

Welcome back, my greenhorn hackers!

I began this series on scripting awhile back to teach all aspiring hackers how to write some basic scripts for hacking and reconnaissance. Without developing some basic scripting skills, the aspiring hacker will be condemned to the realm of the script kiddie. This means that you will be limited to using tools developed by someone else, which decreases your probability of success and increases your probability of detection by antivirus (AV) software, intrusion detection systems (IDS), and law enforcement. With some scripting skills, you can elevate to the upper echelon of professional hackers!

In my previous scripting tutorials, I've covered BASH, Perl and PowerShell scripting, and along the way, we built our own network port scanner using Perl. Here we will begin looking at the most widely used scripting language for hackers, Python.

Python has some important features that make it particularly useful for hacking, but probably most importantly, it has some pre-built libraries that provide some powerful functionality. Python ships with over 1,000 modules and many more are available in various other repositories. This isn't to say that scripting languages like BASH, Perl, and Ruby can't do the same things as Python, but building those capabilities are much easier using Python.

Adding Python Modules

The Python standard library and modules provide an extensive range of capabilities including built-in data types, exception handling, numeric and math modules, file handling, cryptographic services, Internet data handling, and interaction with Internet protocols (IPs).

Despite all of the power offered by these standard libraries and modules, we may need or want additional third-party modules. The third-party modules available for Python are extensive and is probably the reason most hackers prefer Python for scripting. You can find a comprehensive list of third-party modules at PyPI: The Python Package Index.

If we need to install a third-party module, we can simply use wget to download it from the repository, uncompress the module, then run the python setup.py install command. As an example, let's download and install the Nmap python module from a small repository at xael.org.

First, let's download the module from xael.org:

kali > wget http://xael.org/norman/python/python-nmap/python-nmap-0.3.4.tar.gz

After we have downloaded the new module, we need to uncompress it with tar:

kali > tar -xzf python-nmap-0.3.4.tar.gz

Then, change directories to the newly created directory:

kali > cd python-nmap-.03.4/

Finally, we need to install the new module by typing:

kali > python setup.py install

Now that we have installed this Nmap module, it will be available to us for use in a later tutorial.

Getting Started Scripting with Python

Now that know how to install modules in Python, I want to cover some of the basic concepts and terminology of Python, then the basic syntax, and finally, we will write some scripts that will be useful to hackers everywhere, which will demonstrate the power of Python.

Like the other scripting languages we have explored, we can create our script in any text editor. I'll be using the built-in GUI text editor in Kali, Leafpad, but you can use whichever text editor you prefer.

Formatting

Unlike some of the other scripting languages, formatting is very important in Python. The Python interpreter uses the formatting to determine how code is grouped together. The particulars of the formatting are less important than being consistent. So, if you have a group of code that you start with double indentation, you must be consistent with the double indentation for Python to recognize that the code belongs together. This is different from scripting in other programming languages where formatting is optional and best practice, but not required.

Running Python Files

To become familiar with the basics of running Python files, let's create a simple script in Leafpad and save it as greetings.py.

#! /usr/bin/python
name="<your name>'
print "Greetings to " + name + " from Null Byte!"

The first line simply tells our system that we want to use the Python interpreter. The second line defines a variable "name" and assigns a value to it, in this case "your name." Note that I put in my name, "OTW." The third line then creates a print statement concatenating "Greetings to" with the value in the name variable to "from Null Byte!"

Now, before we can run this script, we need to give ourselves permission to execute it. We need the chmod command to do that. (For more information on Linux permissions, see this article.)

kali > chmod 755 greetings.py

When we run this simple script, we get:

Comments

Like any programming and scripting language, Python has the capability of adding comments. Comments are simply words, sentences, and even paragraphs that explain what the code is meant to do. Although comments are not required, it sure is helpful when you come back to it two years later and can't remember what that script was meant to do.

Comments are not seen by the interpreter. This mean that any line designated a comment is skipped by the interpreter until it comes to a legitimate line of code. As with many other languages, Python uses the # at the start of a line to designate that single line as a comment. If we want to write multi-line comments, we can use three double quotation marks (""").

As you can see in the screenshot below, I have added a short multi-line comment to our simple greeting.py script.

When we execute it again, nothing changes. It runs exactly the same, but now we have some info about our script when we return to it at a later time.

Modules

Python allows us to group our code into modules. If we want to use a module, we need to "import" it. When we import a module, we then gain access to all of the classes, class methods, and functions (don't worry if you don't understand this. I'll try to explain it in my next tutorial on Python) that were created in the module. These modules are one of the key features that makes Python so powerful for the hacker.

These are the very basics of the Python scripting language. In our second guide on Python scripting, we will add variables, lists, arguments, dictionaries, control statements, functions, and exception handling working towards developing some simple, but valuable hacking scripts, so keep coming back, my greenhorn hacker!

Just updated your iPhone? You'll find new emoji, enhanced security, podcast transcripts, Apple Cash virtual numbers, and other useful features. There are even new additions hidden within Safari. Find out what's new and changed on your iPhone with the iOS 17.4 update.

Cover image via Shutterstock

12 Comments

I can't wait for this (as for the many series you are coming up lately), python explained by OTW sounds quite interesting, I'm sure it will wipe all the shadows on my knowledge about python. I'm currently working with C (network programming) but I heard python is more reliable on this (is it?).

GL with the script Cracker!

"Without developing some basic scripting skills, the aspiring hacker will be condemned to the realm of the script kiddie" <-- so true.

Also its worth mentioning sites like "code cademy". A great place to get started on coding, or do it the old fashion way, grab a book and follow along. (I personally like interactive sites more).

Great topic, really looking forward to the sequels.

Nice website! That'll help

because I think you need practise to learn scripting. So it's a great combination with OTW's tutorials.

I love that quote, so much condensed truth in there.

There is a free and really well done manual (for beginners in Python and programming in general) called "Learn Python The Hard Way". It encourages you to find some answers in documentation and search the web sometimes, if that's what you call "interactive".

Ok I understand that python is a powerful language and you can do a lot with it and freely contribute to its development. But, for hacking, if you are wanting to do a pentest on a establishment or other entity how would you make sure your program works when it is dependent on downloaded modules. Take a keylogger for example... if you are importing "keyboard" - written by BoppreH @ github, wouldn't your program automatically crash since the import is not available on that machine...

The link wont work to download the module pls halp

Trying to download the module from xael.org.
I get an error

root@localhost:~# wget http://xael.org/pages/python-nmap-en.html/python-nmap-06.1.tar.gz
--2017-08-10 03:21:34-- http://xael.org/pages/python-nmap-en.html/python-nmap-06.1.tar.gz
Resolving xael.org (xael.org)... 194.36.166.10
Connecting to xael.org (xael.org)|194.36.166.10|:80... connected.
HTTP request sent, awaiting response... 404 Not Found
2017-08-10 03:21:34 ERROR 404: Not Found.

What went wrong???
Please help me out?

If you click on the link, you get a 404 error, that means that it doesn't exist anymore.
Use the link mentioned above.

Can Any Buddy Tell Me How To Python To Make Own Hacking Tools please Reply Me

please provide some python course to learn about python scripting for hacking

Share Your Thoughts

  • Hot
  • Latest