Python 3 For Offensive PenTest A Complete Practical Course

Updated Python 3.7 / Windows 10 & Kali 2. Learn how to use python for ethical hacking and penetration testing
Python 3 For Offensive PenTest A Complete Practical Course
File Size :
2.81 GB
Total length :
4h 56m

Category

Instructor

Hussam Khrais

Language

Last update

2/2023

Ratings

4.7/5

Python 3 For Offensive PenTest A Complete Practical Course

What you’ll learn

Learn how to code your own reverse shell [TCP+HTTP]
Learn how to exfiltrate data from your target
Make anonymous shell by interacting with [Twitter, Google Form, Sourceforge]
Replicate Metasploit features and and make an advanced shell
Learn how to hack passwords using multiple techniques [Keylogger, Clipboard Hijacking]
Learn how malware abusing cryptography by adding [AES,RSA,XOR] encryption to your shell
Privilege escalation on windows with practical example

Python 3 For Offensive PenTest A Complete Practical Course

Requirements

Basic knowledge in Python or ANY other programming/scripting languages
Intermediate knowledge in penetration testing and ethical hacking

Description

When other’s tools fail, writing your own makes you a true penetration tester!—————          Before You Enroll !The knowledge which you will learn from this course is literally a weapon. My goal is to make you a better warrior in penetration testing. Consider the consequences of your actions, be smart and don’t go to jail.There are quite a lot of people who call themselves hackers but in reality few have the solid skills to fit the definition, when other’s tools fail, writing your own makes you a true hacker!—————FAQWhy Python?Easy to learnCross platformUnlimited third party librariesGet your job done with few linesRanked as #1 for the most popular programming languagesPlenty of open source hacking tools are written in python which can be easily integrated within your scriptHow To Use This Course?View the course in order, start from module 1 and move on.Before you see the video, download the script, read the inline comments, run the script in your home lab, then finally see the explanatory video, if you still got any question, post it in Udemy forum.Don’t skip the exercises, Google is your best friend.Fall in love with Python, go for extra mile and start writing your own weapons!How to reach me?Udemy forums in case you have ANY question or technical problem.LinkedIn if you have ANY questions prior taking the course, Ideas and collaboration are welcomed.

Overview

Section 1: Quick Intro

Lecture 1 Course Intro

Lecture 2 Preparing Kali 2 linux & Windows 10

Section 2: Python 3 / Windows 10 / Kali 2 : Gaining Access – Your First Persistence Shell

Lecture 3 Download Scripts

Lecture 4 TCP Reverse Shell Outline

Lecture 5 Server Side – Coding a TCP Reverse Shell

Lecture 6 Client Side – Coding a TCP Reverse Shell

Lecture 7 Exercise: Overcome Empty String

Lecture 8 Coding a Low Level Data Exfiltration

Lecture 9 Exporting To EXE

Lecture 10 Exercise: Downloading Tools From Hacker Machine

Lecture 11 HTTP Reverse Shell Outline

Lecture 12 Coding a HTTP Reverse Shell

Lecture 13 Data Exfiltration

Lecture 14 Exercise: Switching user-agent value

Lecture 15 Persistence Outline

Lecture 16 Making our HTTP Reverse Shell Persistent

Lecture 17 Tuning the connection attempts

Lecture 18 Final Notes & Countermeasures

Section 3: Python 3 / Windows 10 / Kali 2 : Advanced Scriptable Shell

Lecture 19 Download Scripts

Lecture 20 DDNS Aware Shell

Lecture 21 Interacting with Twitter

Lecture 22 Exercise: Twitter as DDNS? Tweet your Kali IP:port

Lecture 23 Target Directory Navigation

Lecture 24 Replicating Metasploit “Screen Capturing”

Lecture 25 Replicating Metasploit “Searching for Content”

Lecture 26 Integrating Low Level Port Scanner

Section 4: Python 3 / Windows 10 / Kali 2 : Catch Me If You Can!

Lecture 27 Download Scripts

Lecture 28 Bypassing Host Based Firewall Outline

Lecture 29 Hijacking Internet Explorer – Shell Over Internet Explorer

Lecture 30 Bypassing Reputation Filtering in Next Generation Firewalls – Outline

Lecture 31 Interacting with Source Forge

Lecture 32 Interacting with Google Forms

Lecture 33 Exercise: Putting All Together – Bypassing Botnet Filtering

Section 5: Python 3: How Malware Abuse Cryptography? Python Answers

Lecture 34 Download Scripts

Lecture 35 Bypassing IPS with Hand-Made XOR Encryption

Lecture 36 Quick Introduction To Encryption Algorithms

Lecture 37 Protecting Your Tunnel with AES

Lecture 38 Protecting Your Tunnel with RSA

Lecture 39 Developing One Time, Hybrid – Encryption Key

Section 6: Python 3 / Windows 10 / Kali 2 : Passwords Hacking

Lecture 40 Download Scripts

Lecture 41 Keylogger

Lecture 42 Quick note

Lecture 43 Hijacking KeePass Password Manager

Lecture 44 Bonus: Dumping Saved Passwords Out of Google Chrome

Lecture 45 Bonus: Exercise: Dumping Saved Passwords Out of Google Chrome

Lecture 46 Quick note

Lecture 47 Man in the Browser Outline

Lecture 48 FireFox API Hooking with ImmunityDebugger

Lecture 49 Python in Firefox PoC

Lecture 50 Exercise: Python in Firefox EXE

Lecture 51 Passwords Phishing – DNS Poisoning

Lecture 52 In Action: Facebook Password Phishing

Lecture 53 Don’t Skip Me! – Countermeasures

Section 7: Windows 7 & 10 Privilege Escalation – Weak Service Permission

Lecture 54 Privilege Escalation Part 1 – Weak Service File Permission Outline

Lecture 55 Privilege Escalation Part 2 – Preparing Vulnerable Software

Lecture 56 Privilege Escalation Part 3 – Backdoor-ing Legitmate Windows Service

Lecture 57 Download – Exercises + Scripts

Lecture 58 Privilege Escalation Part 4 – Create a New Admin account & Erasing Tracks

Ethical hackers and penetration testers,Students preparing for OSCP, OSCE, GPEN, GXPN, CEH,Information security professionals and cyber security consultants,System and network security administrators,Programmers who want to get their hands dirty

Course Information:

Udemy | English | 4h 56m | 2.81 GB
Created by: Hussam Khrais

You Can See More Courses in the IT & Software >> Greetings from CourseDown.com

New Courses

Scroll to Top