Episode Details
Back to Episodes
Getting Started in Python Cybersecurity and Forensics
Description
Are you interested in a career in security using Python? Would you like to stay ahead of potential vulnerabilities in your Python applications? This week on the show, James Pleger talks about Python information security, incident response, and forensics.
James has been doing information security for over fifteen years, working at some of the biggest companies, government agencies, and startups. He shares numerous Python resources to dive into detecting threats and improving your projects.
We discuss how to learn about security topics and get involved in the community. Make sure you check out the massive collection of links in the show notes this week.
Course Spotlight: Exploring HTTPS and Cryptography in Python
In this course, you’ll gain a working knowledge of the various factors that combine to keep communications over the Internet safe. You’ll see concrete examples of how to keep information secure and use cryptography to build your own Python HTTPS application.
Topics:
- 00:00:00 – Introduction
- 00:01:28 – How did you find the show?
- 00:02:00 – Evolution of roles in security
- 00:04:09 – Why is Python leveraged in security?
- 00:07:51 – Red team vs blue team
- 00:10:16 – Application security and bug bounties
- 00:13:31 – What’s your background?
- 00:14:07 – Company focus between regulations vs engineering
- 00:18:09 – Ways to get involved and keep learning
- 00:21:56 – Different perspective from computer science
- 00:23:35 – Red vs blue reprise
- 00:25:07 – Shifting landscape of vulnerabilities
- 00:30:06 – How do you approach tests?
- 00:32:30 – Incident response
- 00:35:54 – Video Course Spotlight
- 00:37:19 – Where does Python come in during an incident?
- 00:43:08 – Crossing into forensic research
- 00:48:43 – Where to practice security research and learn more?
- 00:51:41 – What’s the security community like?
- 00:56:05 – What are you excited about in the world of Python?
- 00:57:53 – What do you want to learn next?
- 01:00:17 – Where can people learn more about what you do?
- 01:00:39 – Thanks and goodbye
Security Specific Tools Written in Python:
- binwalk: Firmware Analysis Tool | ReFirmLabs
- binaryalert: BinaryAlert: Serverless, Real-time & Retroactive Malware Detection | airbnb
- Cuckoo Sandbox - Automated Malware Analysis
- YARA - The pattern matching Swiss knife for malware researchers
- Scapy: Python-based interactive packet manipulation program & library
- radare2-bindings: Bindings of the r2 api for Valabind and friends
- python-iocextract: Defanged Indicator of Compromise (IOC) Extractor | InQuest
- yeti: Your Everyday Threat Intelligence
- capa: The FLARE team’s open-source tool to identify capabilities in executable files
- PDF Tools | Didier Stevens
Incident Response and Memory Forensics: