Basic Programming: File Uploads using Python-Requests

So uploading files is something I figured I should cover first, before discussing the “streaming files” stuff later. In the requests library, there is a pretty simple way to manage uploading files. I’ll cover some examples here, which are probably the ways I end up doing it most often. In all of these examples, we …

AliumTerm: Reverse Shells over Tor, Part 1. Basics.

Before I begin, this project (which will unfold over a few blog posts) probably has no real application to “authorized intrusion activities” (red teaming, penetration testing, etc), and its release has largely been motivated by a desire to show how various problems were identified and overcome along the way. Kind of a “showing the work”. …

Basic Programming: Sending POST requests using Python-Requests

So because I earlier wrote an example of sending GET requests, I figure I’d also supply an example of sending POST requests, because there is a right way to do this, and a way that is usually wrong. Again, it comes down to the difference between doing this with string manipulation, and just using a …

Basic Programming: Disabling Certificate Validation and Warnings in Python-Requests

Most of the time, when writing exploits, we don’t care much for certificate validation. Especially when we are writing exploits for embedded devices or suchlike that uses self-signed certs. So we will be wanting to disable certificate validation. When writing actual sensible software that talks to real things, you probably do NOT want to be …