Network automation using Python. Automating your Cisco environment doesn't have to be complex. Using the send_config_set() method in Netmiko, you can create loopback interfaces in seconds. Check out this simple Python implementation for Catalyst switches! 👇 #NetDevOps #Cisco #PythonCoding"
Automate Cisco Network with Python and Netmiko
More Relevant Posts
-
When using Python Netmiko to connect to Cisco devices, the `send_command()` method automatically enters privileged EXEC mode before executing commands that require elevated permissions. True or false? Explain your reasoning. #CCNA #Python #NetworkAutomation #Netmiko #CiscoNetworking
To view or add a comment, sign in
-
-
Developed a simple chat application using Python socket programming. The project consists of a server and client that communicate with each other through the terminal. It demonstrates basic network communication where messages can be sent and received between two programs.
To view or add a comment, sign in
-
CISA reports active exploitation of CVE-2026-33017, a critical code injection flaw in Langflow AI-agent framework enabling unauthenticated remote Python code execution. Upgrade to Langflow 1.9.0 recommended. #Langflow #CISA #USA ➡️ https://ift.tt/NncjIWi
To view or add a comment, sign in
-
-
I posted a new Microsoft Fabric idea for Pure Python notebooks: https://lnkd.in/dmCsfsa9 A useful improvement would be support for: - configurable session timeout - explicit session termination / kill session This would improve capacity efficiency and make Pure Python notebooks much more practical for automated and production workloads. If you see the same gap, feel free to support the idea. #MicrosoftFabric #Python #DataEngineering #FabricNotebook
To view or add a comment, sign in
-
Good morning. Another supply chain attack: If you use the Telnyx Python SDK, make sure you’re not on 4.87.1 or 4.87.2. Both are compromised.
🚨 TeamPCP compromised the Telnyx #Python SDK on PyPI. Malicious versions 4.87.1 and 4.87.2 steal credentials. Full analysis → https://lnkd.in/em9Zf5st
To view or add a comment, sign in
-
-
🚨 TeamPCP compromises another open source project What happened: Versions 4.87.1 and 4.87.2 of the telnyx Python SDK on PyPI were compromised by TeamPCP with credential-stealing malware. PyPI has quarantined both versions. Users should pin to 4.87.0. How it works: Three-stage attack chain. Malicious code injected into _client.py (the core HTTP client), so it fires at import telnyx – not via postinstall hooks, which are heavily monitored. Dual OS-specific paths: Windows gets a persistent binary dropped in the Startup folder disguised as msbuild.exe; Linux/macOS gets a one-shot fileless harvester that exfiltrates credentials and self-destructs. Notable tradecraft: - Audio steganography for payload delivery – second-stage harvester hidden in WAV files downloaded from C2, extracted via base64 + XOR - Fileless execution on Linux – harvester runs via stdin pipe to a child Python process, never touches disk - Hybrid encryption on exfil – AES-256-CBC with RSA-4096 wrapped session keys using OAEP padding. Data is unrecoverable without the attacker’s private key - No new dependencies added – uses only stdlib modules and system openssl/curl Operational details: The attacker shipped a bugfix release (4.87.2) solely to fix a case-sensitivity typo that broke the Windows path. This confirms sustained access to publishing credentials and an active testing pipeline. Neither malicious version has corresponding commits in the official GitHub repo. C2: 83.142.209.203:8080, plain HTTP, telephony-themed filenames (ringtone.wav, hangup.wav). Action items: Rotate all credentials from any environment that imported these versions. Block the C2 IP. Check Windows Startup folders. Purge from internal mirrors.
🚨 TeamPCP compromised the Telnyx #Python SDK on PyPI. Malicious versions 4.87.1 and 4.87.2 steal credentials. Full analysis → https://lnkd.in/em9Zf5st
To view or add a comment, sign in
-
-
TeamPCP again... is going to be a daily thing? It looks like the socket-team was on this very quickly which limited the compromise window but if TeamPCP did get credentials out of this, it gives them access to perform automated phonecalls (vhishing), and SMS campaigns at (AI) scale. The gift just keeps on giving.... They're getting pretty crafty in terms of hiding their malware. Not exactly new/ground-breaking, but clever and existing defenses don't easily spot this sort of thing. Audio Steganographic Payload Delivery Rather than embedding the second-stage harvester directly in the package (which would be trivially flagged by static analysis tools and PyPI's malware scanners), the threat actor employs audio steganography as a retrieval mechanism. The script downloads ringtone.wav. The choice of a .wav file is not arbitrary. WAV is a raw, uncompressed audio format whose frame data is essentially an opaque byte stream. Unlike MP3 or OGG, WAV frames undergo no lossy compression that would corrupt embedded data. And unlike executable or archive formats, audio files are unlikely to trigger content-type-based network inspection or endpoint detection rules. To a network monitor or a proxy log, the download appears to be a benign audio file fetch.
🚨 TeamPCP compromised the Telnyx #Python SDK on PyPI. Malicious versions 4.87.1 and 4.87.2 steal credentials. Full analysis → https://lnkd.in/em9Zf5st
To view or add a comment, sign in
-
-
While learning Python, I started exploring how it fits into day-to-day DevOps tasks. Turns out, even small scripts can help with things like: • Log analysis • API calls and JSON parsing • Running system commands • Monitoring CPU, memory, and disk usage • Simple service health checks Automation doesn’t always require complex tools — sometimes a simple Python script can do the job. Sharing some useful Python examples for DevOps in the attached notes 👇 #DevOps #Python #Automation #CloudEngineering
To view or add a comment, sign in
-
Python in Project: title is ATM Application: If you want a simple ATM Application in Python, here is a basic console program that allows a user to: Check Balance Deposit Money Withdraw Money Exit. Pooja Chinthakayala Mam,Saketh Kallepu Sir,Uppugundla Sairam Sir.
To view or add a comment, sign in
-
🚀 Day 7 of my Python Automation Journey Today I built a System Monitor using Python. This script displays important system information such as: • CPU usage • Memory usage • Disk usage Example Output: CPU Usage: 18% Memory Usage: 52% Disk Usage: 63% My GitHub repository now contains 7 Python automation projects: • Word Counter • File Renamer • Password Generator • Web Scraper • CSV Data Cleaner • File Organizer • System Monitor Learning by building small projects every day to strengthen my Python and automation skills. #Python #Automation #PythonProjects #CodingJourney #LearningInPublic
To view or add a comment, sign in
-
More from this author
Explore related topics
Explore content categories
- Career
- Productivity
- Finance
- Soft Skills & Emotional Intelligence
- Project Management
- Education
- Technology
- Leadership
- Ecommerce
- User Experience
- Recruitment & HR
- Customer Experience
- Real Estate
- Marketing
- Sales
- Retail & Merchandising
- Science
- Supply Chain Management
- Future Of Work
- Consulting
- Writing
- Economics
- Artificial Intelligence
- Employee Experience
- Workplace Trends
- Fundraising
- Networking
- Corporate Social Responsibility
- Negotiation
- Communication
- Engineering
- Hospitality & Tourism
- Business Strategy
- Change Management
- Organizational Culture
- Design
- Innovation
- Event Planning
- Training & Development