Learn to use Python for ethical hacking and penetration testing.
About This Video
- Highly technical, completely hands-on, straight to the point!
- Set up your home virtual hacking lab
- Updated for Python 3.7/Windows 10, and Kali 2
Assume your target is running unpatched Windows XP, Anti-Virus is disabled, the firewall is turned off, IPS is not in place then you may (or not) get into a system! Does that sound like a real-world penetration test for you?
If you have ever attended an ethical hacking course that teaches you how to use some tools and how to click on some buttons, then you probably already know that being an advanced hacker needs more knowledge than clicking a few buttons as most of these tools will fail in a real-world scenario.
Whether you get bored from theory and basic courses which repeat the same tools and techniques over and over again and fail to teach you how to hack into even insecure systems, or you want to push your skills from beginner to the next level, then you have come to the right place!
There are quite a lot of people who call themselves hackers but, few have the solid skills to fit the definition, when other's tools fail, writing your own makes you a true hacker.
Table of contents
Chapter 1 : Quick Intro
- Course Intro 00:01:55
Chapter 2 : Python 3 / Windows 10 / Kali 2: Gaining Access - Your First Persistence Shell
- TCP Reverse Shell Outline 00:04:50
- Server Side - Coding a TCP Reverse Shell 00:07:45
- Client Side - Coding a TCP Reverse Shell 00:08:44
- Coding a Low-Level Data Exfiltration 00:07:11
- Exporting To EXE 00:02:53
- HTTP Reverse Shell Outline 00:02:36
- Coding a HTTP Reverse Shell 00:11:07
- Data Exfiltration 00:07:46
- Persistence Outline 00:04:30
- Making our HTTP Reverse Shell Persistent 00:10:07
- Tuning the connection attempts 00:04:24
- Chapter 3 : Python 3 / Windows 10 / Kali 2: Advanced Scriptable Shell
- Chapter 4 : Python 3 / Windows 10 / Kali 2: Catch Me If You Can!
- Chapter 5 : Python 3: How Malware Abuse Cryptography? Python Answers
Chapter 6 : Python 3 / Windows 10 / Kali 2: Passwords Hacking
- Keylogger 00:02:27
- Hijacking KeePass Password Manager 00:06:54
- Bonus: Dumping Saved Passwords Out of Google Chrome 00:14:35
- Bonus: Exercise: Dumping Saved Passwords Out of Google Chrome 00:02:33
- Man in the Browser Outline 00:05:27
- FireFox API Hooking with ImmunityDebugger 00:11:27
- Python in Firefox PoC 00:09:17
- Exercise: Python in Firefox EXE 00:06:31
- Passwords Phishing - DNS Poisoning 00:10:10
- In Action: Facebook Password Phishing 00:10:30
- Don't Skip Me! – Countermeasures 00:06:02
Chapter 7 : Windows 7 & 10 Privilege Escalation - Weak Service Permission
- Privilege Escalation Part 1 - Weak Service File Permission Outline 00:03:24
- Privilege Escalation Part 2 - Preparing Vulnerable Software 00:06:37
- Privilege Escalation Part 3 - Backdoor-ing Legitmate Windows Service 00:13:27
- Privilege Escalation Part 4 - Create a New Admin account & Erasing Tracks 00:05:18
- Title: Python 3 For Offensive PenTest: A Complete Practical Course
- Release date: October 2019
- Publisher(s): Packt Publishing
- ISBN: 9781839212109
You might also like
The Complete Cybersecurity Bootcamp (Video Collection): Threat Defense, Ethical Hacking, and Incident Handling
More than 25 Hours of Expert Video Instruction This course is a complete guide to help …
The Complete Ethical Hacking Course
Protect yourself from hackers and cyber attacks. Master penetration testing + build security and coding tools …
Hands-On Penetration Testing with Python
Implement defensive techniques in your ecosystem successfully with Python Key Features Identify and expose vulnerabilities in …
Python Network Programming for Network Engineers (Python 3)
Program networks using Python 3. Learn network programmability with this practical GNS3 and Cisco course About …