Switch to the store?

Black Hat Python for Pentesters and Hackers [Video]

More Information
Learn
  • Setting up Lab Environment for pentesting using python. 
  • Perform Linux and Windows Pentesting with python.
  • Learn to Write Python Pentesting Scripts.
  • Perform Endpoint Penetration testing on Victim Machines. 
  • Work through best practices for Client Penetration Testing.
About

When it comes to offensive security, your ability to create powerful tools on the fly is indispensable. Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write quickly, and it has the low-level support and libraries that make hackers happy.
In this course, you’ll explore the darker side of Python’s capabilities—writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, and more. This course starts from scratch and provides the latest tools and techniques available for Pentesting using Python scripts. We’ll show you the concepts and how to implement hacking tools and techniques such as debuggers, fuzzers, and emulators. You’ll detect sandboxing and automate com-mon malware tasks, such as keylogging and screenshotting.
You’ll be able to escalate Windows privileges with creative process control, use offensive memory forensics tricks to retrieve password hashes, and inject shellcode into a virtual machine. Later, you’ll learn to extend the popular Burp Suite web-hacking tool, abuse Windows COM automation to perform a man-in-the browser attack, and exfiltrate data from a network most sneakily.
After completing this course, you’ll understand how to use Python scripts for penetration testing.

Codes are available here: https://github.com/PacktPublishing/Black-Hat-Python-for-Pentesters-Hackers

Style and Approach

The course explores the key topics incisively with the combined use of theory and practical demonstrations to help the viewer get a broad understanding of the topic

Features
  • Write and implement Python Scripts to Pentest Linux and Windows Machines
  • Bypass the security mechanisms of target machine to get access to services
  • Perform with the help of various Python examples
Course Length 2 hours 51 minutes
ISBN9781789619874
Date Of Publication 30 Nov 2018

Authors

Sunil Gupta

Sunil Gupta. He is a Cyber Security Specialist.

Currently, he teaches 50,000+ students online, in 170+ countries. He is a specialist in Ethical Hacking.

Author strengths –

  • Vulnerability assessment
  • Penetration testing
  • Bug bounty hunting
  • Intrusion detection
  • Risk identification
  • Data analysis
  • Reporting and briefing