Python For Offensive PenTest: A Complete Practical Course [Video]

Preview in Mapt

Python For Offensive PenTest: A Complete Practical Course [Video]

Hussam Khrais

3 customer reviews
Python for Hacking , Learn how to use python for ethical hacking and penetration testing
Mapt Subscription
FREE
$29.99/m after trial
Video
$13.00
RRP $64.99
Save 79%
What do I get with a Mapt Pro subscription?
  • Unlimited access to all Packt’s 5,000+ eBooks and Videos
  • Early Access content, Progress Tracking, and Assessments
  • 1 Free eBook or Video to download and keep every month after trial
What do I get with an eBook?
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with Print & eBook?
  • Get a paperback copy of the book delivered to you
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with a Video?
  • Download this Video course in MP4 format
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
$0.00
$13.00
$29.99 p/m after trial
RRP $64.99
Subscription
Video
Start 14 Day Trial

Frequently bought together


Python For Offensive PenTest: A Complete Practical Course [Video] Book Cover
Python For Offensive PenTest: A Complete Practical Course [Video]
$ 64.99
$ 13.00
Complete Ethical Hacking Series: Pen Testing the Right Way [Video] Book Cover
Complete Ethical Hacking Series: Pen Testing the Right Way [Video]
$ 19.99
$ 4.00
Buy 2 for $17.00
Save $67.98
Add to Cart

Video Details

ISBN 139781788628068
Course Length5 hours 57 minutes

Video Description

The knowledge which you will learn from this course is literally a weapon. My goal is to make you a better warrior in penetration testing. Consider the consequences of your actions, be smart and don't go to jail. There are quite a lot of people who call themselves hackers but in reality few have the solid skills to fit the definition, when other's tools fail, writing your own makes you a true hacker!. View the course in order, start from module 1 and move on. Before you see the video, download the script, read the inline comments, run the script in your home lab, then finally see the explanatory video, don't skip the exercises, Google is your best friend. Fall in love with Python, go for extra mile and start writing your own weapons!

Style and Approach

Firstly, download the script, read the inline comments, run the script in your home lab, then finally see the explanatory video

Table of Contents

Quick Intro
Introduction
Warming up - Your First Anti-Virus Free Persistence Shell
Home Lab Setup - Preparing Attacker Machine - Kali linux
Home Lab Setup - Preparing Target Machine - Windows 7
TCP Reverse Shell Outline
Coding a TCP Reverse Shell
Data Exfiltration
Exporting To EXE
HTTP Reverse Shell Outline
Coding HTTP Reverse Shell In 5 Lines of Python!
Data Exfiltration
Exporting To EXE
Persistence Outline
Making Putty.exe Persistant
Wrap up - Making a Persistant HTTP Reverse Shell
Tuning the connection attempts
Final Notes
Countermeasures
Advanced Scriptable Shell
Dynamic DNS (DDNS) Outline
DDNS Aware Shell
Interacting with Twitter
Parsing Tweet in 3 Lines!
Countermeasures
Replicating Metasploit "Screen Capturing"
Replicating Metasploit "Searching for Content"
Target Directory Navigation
Integrating Low Level Port Scanner
Passwords Hacking
Anti-Virus Free Keylogger
Hijacking KeePass Password Manager
Man in the Browser Outline
FireFox API Hooking with ImmunityDebugger
Python in Firefox PoC
Exercise: Python in Firefox EXE
Bonus: Dumping Saved Passwords Out of Google Chrome
Exercise: Dumping Saved Passwords Out of Google Chrome
Passwords Phishing - DNS Poisoning
In Action: Facebook Password Phishing
Don't Skip Me! – Countermeasures
Catch Me If You Can!
Bypassing Host Based Firewall Outline
Hijacking Internet Explorer - Shell Over Internet Explorer
Bypassing Reputation Filtering in Next Generation Firewalls – Outline
Interacting with Source Forge
Interacting with Google Forms
Exercise: Putting All Together - Bypassing Botnet Filtering
Bypassing IPS with Hand-Made XOR Encryption
Miscellaneous Fun in Windows
Privilege Escalation Part 1 - Weak Service File Permission Outline
Privilege Escalation Part 2 - Preparing Vulnerable Software
Privilege Escalation Part 3 - Backdoor-ing Legitmate Windows Service
Privilege Escalation Part 4 - Create a New Admin account & Erasing Tracks
+Bonus: How Malware Abuse Cryptography? Python Answers
Quick Introduction To Encryption Algorithms
Protecting Your Tunnel with AES
Protecting Your Tunnel with RSA
Developing One Time, Hybrid - Encryption Key

What You Will Learn

  • Learn how to code your own reverse shell [TCP+HTTP]
  • Make anonymous shell by interacting with [Twitter, Google Form, Sourceforge]
  • Replicate Metasploit features and make an advanced shell
  • Learn how to hack passwords using multiple techniques [API Hooking. Keylogger, -
  • Clipboard Hijacking]
  • Learn how to exfiltrate data from your target
  • Learn how malware abusing cryptography by adding [AES,RSA,XOR] encryption to your
  • shell
  • Privilege escalation on windows with practical example
  • Export your python script into EXE
  • You'll get answers to your questions!
  • You will setup your home virtual hacking lab
  • You will learn countermeasures against most of the attacks
  • Challenge yourself with UNSOLVED Exercises

Authors

Table of Contents

Quick Intro
Introduction
Warming up - Your First Anti-Virus Free Persistence Shell
Home Lab Setup - Preparing Attacker Machine - Kali linux
Home Lab Setup - Preparing Target Machine - Windows 7
TCP Reverse Shell Outline
Coding a TCP Reverse Shell
Data Exfiltration
Exporting To EXE
HTTP Reverse Shell Outline
Coding HTTP Reverse Shell In 5 Lines of Python!
Data Exfiltration
Exporting To EXE
Persistence Outline
Making Putty.exe Persistant
Wrap up - Making a Persistant HTTP Reverse Shell
Tuning the connection attempts
Final Notes
Countermeasures
Advanced Scriptable Shell
Dynamic DNS (DDNS) Outline
DDNS Aware Shell
Interacting with Twitter
Parsing Tweet in 3 Lines!
Countermeasures
Replicating Metasploit "Screen Capturing"
Replicating Metasploit "Searching for Content"
Target Directory Navigation
Integrating Low Level Port Scanner
Passwords Hacking
Anti-Virus Free Keylogger
Hijacking KeePass Password Manager
Man in the Browser Outline
FireFox API Hooking with ImmunityDebugger
Python in Firefox PoC
Exercise: Python in Firefox EXE
Bonus: Dumping Saved Passwords Out of Google Chrome
Exercise: Dumping Saved Passwords Out of Google Chrome
Passwords Phishing - DNS Poisoning
In Action: Facebook Password Phishing
Don't Skip Me! – Countermeasures
Catch Me If You Can!
Bypassing Host Based Firewall Outline
Hijacking Internet Explorer - Shell Over Internet Explorer
Bypassing Reputation Filtering in Next Generation Firewalls – Outline
Interacting with Source Forge
Interacting with Google Forms
Exercise: Putting All Together - Bypassing Botnet Filtering
Bypassing IPS with Hand-Made XOR Encryption
Miscellaneous Fun in Windows
Privilege Escalation Part 1 - Weak Service File Permission Outline
Privilege Escalation Part 2 - Preparing Vulnerable Software
Privilege Escalation Part 3 - Backdoor-ing Legitmate Windows Service
Privilege Escalation Part 4 - Create a New Admin account & Erasing Tracks
+Bonus: How Malware Abuse Cryptography? Python Answers
Quick Introduction To Encryption Algorithms
Protecting Your Tunnel with AES
Protecting Your Tunnel with RSA
Developing One Time, Hybrid - Encryption Key

Video Details

ISBN 139781788628068
Course Length5 hours 57 minutes
Read More
From 3 reviews

Read More Reviews

Recommended for You

Complete Ethical Hacking Series: Pen Testing the Right Way [Video] Book Cover
Complete Ethical Hacking Series: Pen Testing the Right Way [Video]
$ 19.99
$ 4.00
The Complete Step By Step Java For Testers [Video] Book Cover
The Complete Step By Step Java For Testers [Video]
$ 100.99
$ 20.20
Progressive Web Apps (PWA) - The Complete Guide [Video] Book Cover
Progressive Web Apps (PWA) - The Complete Guide [Video]
$ 149.99
$ 30.00
Vue JS 2 - The Complete Guide (incl. Vue Router and Vuex) [Video] Book Cover
Vue JS 2 - The Complete Guide (incl. Vue Router and Vuex) [Video]
$ 188.99
$ 37.80
Learn by Example: Python [Video] Book Cover
Learn by Example: Python [Video]
$ 98.99
$ 19.80
A Developer's Guide to Blockchain, Bitcoin and Cryptocurrencies [Video] Book Cover
A Developer's Guide to Blockchain, Bitcoin and Cryptocurrencies [Video]
$ 49.99
$ 10.00