Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Python For Offensive PenTest: A Complete Practical Course
Home Lab Setup
Intro (2:36)
Preparing Attacker Machine - Kali linux (3:36)
Preparing Target Machine - Windows 7 (6:56)
Download Link
Warming up - Your First Anti-Virus Free Persistence Shell
TCP Reverse Shell Outline (4:27)
Coding a TCP Reverse Shell (6:08)
Data Exfiltration (7:30)
Exporting To EXE (4:05)
HTTP Reverse Shell Outline (2:41)
Coding HTTP Reverse Shell In 5 Lines of Python! (6:41)
Data Exfiltration (6:14)
Exporting To EXE (2:36)
Persistence Outline (3:58)
Making Putty.exe Persistant (7:54)
Wrap up - Making a Persistant HTTP Reverse Shell (7:11)
Tuning the connection attempts (7:10)
Final Notes (2:57)
Countermeasures (2:02)
Download - Exercises + Scripts
Advanced Scriptable Shell
Dynamic DNS (DDNS) Outline (2:28)
DDNS Aware Shell (4:44)
Interacting with Twitter (2:13)
Parsing Tweet in 3 Lines! (6:48)
Countermeasures (3:40)
Replicating Metasploit "Screen Capturing" (8:58)
Replicating Metasploit "Searching for Content" (6:34)
Target Directory Navigation (4:00)
Integrating Low Level Port Scanner (7:50)
Download - Exercises + Scripts
Passwords Hacking
Anti-Virus Free Keylogger (8:47)
Hijacking KeePass Password Manager (6:55)
Man in the Browser Outline (5:28)
FireFox API Hooking with ImmunityDebugger (11:29)
Python in Firefox PoC (9:18)
Exercise: Python in Firefox EXE (6:33)
Bonus: Dumping Saved Passwords Out of Google Chrome (14:36)
Bonus: Exercise: Dumping Saved Passwords Out of Google Chrome (2:34)
Passwords Phishing - DNS Poisoning (10:12)
In Action: Facebook Password Phishing (10:32)
Don't Skip Me! - Countermeasures (6:03)
Download - Exercises + Scripts
Catch Me If You Can!
Bypassing Host Based Firewall Outline (5:33)
Hijacking Internet Explorer - Shell Over Internet Explorer (7:15)
Bypassing Reputation Filtering in Next Generation Firewalls - Outline (4:30)
Interacting with Source Forge (13:31)
Interacting with Google Forms (9:02)
Exercise: Putting All Together - Bypassing Botnet Filtering (4:04)
Bypassing IPS with Hand-Made XOR Encryption (10:56)
Download - Exercises + Scripts
Miscellaneous Fun in Windows
Privilege Escalation Part 1 - Weak Service File Permission Outline (3:25)
Privilege Escalation Part 2 - Preparing Vulnerable Software (8:12)
Privilege Escalation Part 3 - Backdoor-ing Legitmate Windows Service (13:33)
Privilege Escalation Part 4 - Create a New Admin account & Erasing Tracks (5:19)
Download - Exercises + Scripts
Bonus: How Malware Abuse Cryptography? Python Answers
Quick Introudction To Encryption Algorithms (10:14)
Protecting Your Tunnel with AES (8:12)
Protecting Your Tunnel with RSA (23:43)
Developing One Time, Hybrid - Encryption Key Preview (7:32)
Interacting with Twitter
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock