We want to learn how to send an HTTP request with Python.
- [Teacher] Hi, welcome to the third video of Section 2.…In the previous video, we learned about HTTP requests.…In this video, we're going to start to write Python code…to perform HTTP requests using the REQUESTS library.…First, we're going to do a quick…introduction to REQUESTS library.…Then, we're going to write our first script…to perform a GET request.…We're going to see how to access the response headers,…perform a head request, and finally, how to perform…a POST request using Python and REQUESTS library.…
REQUESTS is an Apache 2 licensed…HTTP library written in Python.…It was created to reduce the complexity…and work needed when using urllib2…and other HTTP libraries available at the moment.…On the left side, we can see an example…of the code needed to perform a request…to api.github.com using authentication…when using urllib2 library.…On the right, we can see the same function,…but using REQUESTS library.…
The simplicity is pretty evident.…It really facilitates our job when coding scripts.…Let's start programming in Python.…
Stop using automated testing tools. Customize and write your own tests with Python! While there are an increasing number of sophisticated ready-made tools to scan systems for vulnerabilities, Python allows testers to write system-specific scripts—or alter and extend existing testing tools—to find, exploit, and record as many security weaknesses as possible. This course will give you the necessary skills to write custom tools for different scenarios and modify existing Python tools to suit your application's needs.
Christian Martorella starts off by providing an overview of the web application penetration testing process and the tools the professionals use to perform these tests. Next he shows how to interact with web applications using Python, HTTP, and the Requests library. Then follow the web application penetration testing methodology. Each section contains practical Python examples. To finish off, Christian shows how to use the tools against a vulnerable web application created specifically for this course.
- Understanding web penetration testing
- Interacting with web applications via HTTP and the Requests library
- Analyzing HTTP responses
- Web crawling with Scrapy
- Extracting information
- Discovering resources
- Testing passwords
- Detecting and exploiting SQL injection vulnerabilities
- Intercepting HTTP requests