• Sign In
0

Using Python For Offensive Pentesting

Learn to use Python to create your own White Hat Hacking Tools

Price : $10.00 $99.00
Discount: $89.00
Days
Hours
mins
secs

Add To Cart
Wishlist
Compare

15-Days

Money Back

Access

lifetime

6

Hours

The knowledge which you will learn from this course is literally a weapon. The goal is to make you a better warrior in penetration testing. Consider the consequences of your actions, be smart and don't go to jail.

Whether you get bored from theory and basic courses which repeat the same tools and techniques over and over again and fail to teach you how to hack into even unsecured systems or you want to push your skills from beginner to the next level; then you have come to the right place!

What am I going to get from this course?

  • Over 52 lectures and 5 hours of content!
  • Answers to your questions
  • Highly technical, COMPLETELY hands-on, Straight to the point
  • You will set up your home virtual hacking lab
  • You will learn countermeasures against most of the attacks
  • Challenge yourself with UNSOLVED Exercises

 

    Rating 4.5 (50 Reviews)

  • Home Lab Setup
    •  Intro (2:35)
    •  Preparing Attacker Machine - Kali linux (3:36)
    •  Preparing Target Machine - Windows 7 (6:56)
  •  Download all the Scripts
  • Section 2: Warming up - Your First Anti-Virus Free Persistence Shell
    •  TCP Reverse Shell Outline (4:27)
    •  Coding a TCP Reverse Shell (6:06)
    •  Data Exfiltration (7:28)
    •  Exporting To EXE (4:03)
    •  HTTP Reverse Shell Outline (2:41)
    •  Coding HTTP Reverse Shell In 5 Lines of Python! (6:39)
    •  Data Exfiltration (6:12)
    •  Exporting To EXE (2:35)
    •  Persistence Outline (7:52)
    •  Making Putty.exe Persistant (3:58)
    •  Wrap up - Making a Persistant HTTP Reverse Shell (7:09)
    •  Tuning the connection attempts (7:08)
    •  Final Notes (2:57)
    •  Countermeasures (2:02)
  • Advanced Scriptable Shell
    •  Dynamic DNS (DDNS) Outline (2:28)
    •  DDNS Aware Shell (4:42)
    •  Interacting with Twitter (2:13)
    •  Parsing Tweet in 3 Lines! (6:46)
    •  Countermeasures (3:40)
    •  Replicating Metasploit "Screen Capturing" (8:58)
    •  Replicating Metasploit "Searching for Content" (6:32)
    •  Target Directory Navigation (3:59)
    •  Integrating Low Level Port Scanner (7:48)
  • Passwords Hacking
    •  Anti-Virus Free Keylogger (8:47)
    •  Hijacking KeePass Password Manager (6:55)
    •  Man in the Browser Outline (5:26)
    •  FireFox API Hooking with ImmunityDebugger (11:27)
    •  Python in Firefox PoC (9:16)
    •  Exercise: Python in Firefox EXE (6:33)
    •  Passwords Phishing - DNS Poisoning (10:10)
    •  In Action: Facebook Password Phishing (10:30)
    •  Don