Skip to main content

Hacking with Python

In today’s rapid development environment, Python’s ability to merge scripting and object-oriented programming has made it an essential language to master. This course teaches you how to use Python to build powerful scripts that push the limits of system security. Designed to be used for grayhat hacking, you will learn how to write code that can be used to ethically hack into applications and networks to test security, and to automate reverse engineering tasks in IDA and other common tools. The course finishes with a multi-level challenge, requiring students to demonstrate hacking competencies over a range of different applications. To complete this capstone exercise, you must determine the correct Python code to write and be able to implement it quickly.

Request Course Details

Attending students will learn

  • Automate tedious reversing and security tasks
  • Design and program your own debugger
  • Learn how to fuzz Windows drivers and create powerful fuzzers from scratch
  • Have fun with code and library injection, soft and hard hooking techniques, and other software trickery
  • Sniff secure traffic out of an encrypted web browser session
  • Use PyDBG, Immunity Debugger, Sulley, IDAPython, PyEMU, and more

Who should attend

  • Threat operation analysts seeking a better understanding of malware
  • Incident responders who need to quickly address a system security breach
  • Forensic investigators who need to identify malicious software
  • Individuals who have experimented with malware analysis and want to expand their malware analysis techniques and methodologies


  • Thorough understanding of Microsoft Windows
  • Attendance of Introduction to Python or equivalent experience with Python 2.7 is required
  • Knowledge of OllyDbg and IdaPro is recommended

Course Outline

Day 1

  • Python as a Hack Tool
  • Python as a Reverse Engineering Tool
  • Setting up your development environment
  • Windows Automation
  • Brute Forcing Console Applications
  • Using the CTypes Library
  • SendKeys Module
  • Windows GUI Automation
  • Brute Forcing GUI Applications
  • Clearing Windows Event Logs

Day 2

  • Multi - Threading in Python
  • Building a Python Port Scanner
  • Debugger Concepts
  • Intel X86 Architecture
  • Scripting with PyDBG

Day 3

  • Scripting with Immunity Debugger
  • Scripting with IDA Pro
  • Process Injection with Python

Day 4

  • Hooking
  • Hard Hooking with Immunity Debugger
  • Fuzzing
  • Py2Exe

Day 5 – Student Practical Demonstration:

Students will have to apply what they learned all week in a multi-level challenge. In order to progress to the next level of the challenge they have to complete certain tasks. First they'll have to brute force a password from an application and gain entry. Once they gain the password they'll use that password to progress into the next challenge. This continues four times before they can receive the final hacker prize. This is not a trivial challenge and requires the students to fully understand what python code to write, as well as how to implement the code quickly.

Courses That Follow This Course

Request More Info About This Course

contact Focal Point

tweets by @FocalPointDR

Loading Tweets...