Python For Offensive PenTest: A Complete Practical Course [Video]
- FREE Subscribe Access now
- $64.99 Video Buy
- Instant online access to over 7,500+ books and videos
- Constantly updated with 100+ new titles each month
- Breadth and depth in over 1,000+ technologies
-
Quick Intro
-
Warming up - Your First Anti-Virus Free Persistence Shell
- Home Lab Setup - Preparing Attacker Machine - Kali linux
- Home Lab Setup - Preparing Target Machine - Windows 7
- TCP Reverse Shell Outline
- Coding a TCP Reverse Shell
- Data Exfiltration
- Exporting To EXE
- HTTP Reverse Shell Outline
- Coding HTTP Reverse Shell In 5 Lines of Python!
- Data Exfiltration
- Exporting To EXE
- Persistence Outline
- Making Putty.exe Persistant
- Wrap up - Making a Persistant HTTP Reverse Shell
- Tuning the connection attempts
- Final Notes
- Countermeasures
-
Advanced Scriptable Shell
-
Passwords Hacking
- Anti-Virus Free Keylogger
- Hijacking KeePass Password Manager
- Man in the Browser Outline
- FireFox API Hooking with ImmunityDebugger
- Python in Firefox PoC
- Exercise: Python in Firefox EXE
- Bonus: Dumping Saved Passwords Out of Google Chrome
- Exercise: Dumping Saved Passwords Out of Google Chrome
- Passwords Phishing - DNS Poisoning
- In Action: Facebook Password Phishing
- Don't Skip Me! – Countermeasures
-
Catch Me If You Can!
- Bypassing Host Based Firewall Outline
- Hijacking Internet Explorer - Shell Over Internet Explorer
- Bypassing Reputation Filtering in Next Generation Firewalls – Outline
- Interacting with Source Forge
- Interacting with Google Forms
- Exercise: Putting All Together - Bypassing Botnet Filtering
- Bypassing IPS with Hand-Made XOR Encryption
-
Miscellaneous Fun in Windows
-
+Bonus: How Malware Abuse Cryptography? Python Answers
About this video
The knowledge which you will learn from this course is literally a weapon. My goal is to make you a better warrior in penetration testing. Consider the consequences of your actions, be smart and don't go to jail. There are quite a lot of people who call themselves hackers but in reality few have the solid skills to fit the definition, when other's tools fail, writing your own makes you a true hacker!. View the course in order, start from module 1 and move on. Before you see the video, download the script, read the inline comments, run the script in your home lab, then finally see the explanatory video, don't skip the exercises, Google is your best friend. Fall in love with Python, go for extra mile and start writing your own weapons!
Style and Approach
Firstly, download the script, read the inline comments, run the script in your home lab, then finally see the explanatory video
- Publication date:
- September 2017
- Publisher
- Packt
- Duration
- 5 hours 57 minutes
- ISBN
- 9781788628068