Python 3 For Offensive PenTest: A Complete Practical Course
Created by Hussam Khrais, Last Updated 02-Dec-2019, Language:English
Python 3 For Offensive PenTest: A Complete Practical Course
2019 Updated Python 3 / Windows 10 & Kali 2. Learn how to use python for ethical hacking and penetration testing
Created by Hussam Khrais, Last Updated 02-Dec-2019, Language:English
What Will I Get ?
- Learn how to code your own reverse shell [TCP+HTTP]
- Learn how to exfiltrate data from your target
- Make anonymous shell by interacting with [Twitter, Google Form, Sourceforge]
- Replicate Metasploit features and and make an advanced shell
- Learn how to hack passwords using multiple techniques [Keylogger, Clipboard Hijacking]
- Learn how malware abusing cryptography by adding [AES,RSA,XOR] encryption to your shell
- Privilege escalation on windows with practical example
Requirements
- Basic knowledge in Python or ANY other programming/scripting languages
- Intermediate knowledge in penetration testing and ethical hacking
Description
When other's tools fail, writing your own makes you a true penetration tester!
Before You Enroll !
The knowledge which you will learn from this course is literally a weapon. My goal is to make you a better warrior in penetration testing. Consider the consequences of your actions, be smart and don't go to jail.
There are quite a lot of people who call themselves hackers but in reality few have the solid skills to fit the definition, when other's tools fail, writing your own makes you a true hacker!
Why Python?
Easy to learn
Cross platform
Unlimited third party libraries
Get your job done with few lines
Ranked as #1 for the most popular programming languages
Plenty of open source hacking tools are written in python which can be easily integrated within your script
How To Use This Course?
View the course in order, start from module 1 and move on.
Before you see the video, download the script, read the inline comments, run the script in your home lab, then finally see the explanatory video, if you still got any question, post it in Udemy forum.
Don't skip the exercises, Google is your best friend.
Fall in love with Python, go for extra mile and start writing your own weapons!
How to reach me?
LinkedIn if you have ANY questions prior taking the course, Ideas and collaboration are welcomed.
Who this course is for:
- Ethical hackers and penetration testers
- Students preparing for OSCP, OSCE, GPEN, GXPN, CEH
- Information security professionals and cyber security consultants
- System and network security administrators
- Programmers who want to get their hands dirty
Course Content
-
Python 3 / Windows 10 / Kali 2 : Gaining Access
12 Lectures 01:11:59-
Download Scripts
-
TCP Reverse Shell Outline
Preview00:04:50 -
Server Side - Coding a TCP Reverse Shell
Preview00:07:46 -
Client Side - Coding a TCP Reverse Shell
Preview00:08:44 -
Coding a Low Level Data Exfiltration
00:07:11 -
Exporting To EXE
00:02:52 -
HTTP Reverse Shell Outline
00:02:36 -
Coding a HTTP Reverse Shell
00:11:06 -
Data Exfiltration
00:07:54 -
Persistence Outline
00:04:29 -
Making our HTTP Reverse Shell Persistent
00:10:07 -
Tuning the connection attempts
00:04:24
-
-
Python 3 / Windows 10 / Kali 2 : Advanced Scriptable Shell
7 Lectures 00:38:14-
Download Scripts
-
DDNS Aware Shell
00:05:28 -
Interacting with Twitter
00:09:49 -
Target Directory Navigation
00:06:45 -
Replicating Metasploit "Screen Capturing"
00:04:54 -
Replicating Metasploit "Searching for Content"
00:05:49 -
Integrating Low Level Port Scanner
00:05:29
-
-
Python 3 / Windows 10 / Kali 2 : Catch Me If You Can!
6 Lectures 00:22:08-
Download Scripts
-
Bypassing Host Based Firewall Outline
00:03:24 -
Hijacking Internet Explorer - Shell Over Internet Explorer
00:05:04 -
Bypassing Reputation Filtering in Next Generation Firewalls - Outline
00:02:56 -
Interacting with Source Forge
00:05:49 -
Interacting with Google Forms
00:04:55
-
-
Python 3: How Malware Abuse Cryptography? Python Answers
6 Lectures 00:40:45-
Download Scripts
-
Bypassing IPS with Hand-Made XOR Encryption
00:07:27 -
Quick Introduction To Encryption Algorithms
00:07:05 -
Protecting Your Tunnel with AES
00:08:57 -
Protecting Your Tunnel with RSA
00:12:41 -
Developing One Time, Hybrid - Encryption Key
00:04:35
-
-
Windows 7 & 10 Privilege Escalation - Weak Service Permission
5 Lectures 00:30:19-
Download - Exercises + Scripts
-
Privilege Escalation Part 1 - Weak Service File Permission Outline
00:03:23 -
Privilege Escalation Part 2 - Preparing Vulnerable Software
00:08:09 -
Privilege Escalation Part 3 - Backdoor-ing Legitmate Windows Service
00:13:30 -
Privilege Escalation Part 4 - Create a New Admin account & Erasing Tracks
00:05:17
-
-
Course Resources
1 Lectures-
Course Resources
-