Setup Menus in Admin Panel

  • LOGIN
  • No products in the cart.

Course Name: Python For Offensive PenTest-A Complete

Descriptions

Course Curriculum

Section 1: Home Lab Setup
Intro 00:00:00
Preparing Attacker Machine – Kali linux 00:00:00
Preparing Target Machine – Windows 7 00:00:00
Section 2: Warming up - Your First Anti-Virus Free Persistence Shell
TCP Reverse Shell Outline 00:00:00
Coding a TCP Reverse Shell 00:00:00
Data Exfiltration 00:00:00
Exporting To EXE 00:00:00
HTTP Reverse Shell Outline 00:00:00
Coding HTTP Reverse Shell In 5 Lines of Python 00:00:00
Data Exfiltration 00:00:00
Exporting To EXE 00:00:00
Persistence Outline 00:00:00
Making Putty.exe Persistant 00:00:00
Wrap up – Making a Persistant HTTP Reverse Shell 00:00:00
Tuning the connection attempts 00:00:00
Final Notes 00:00:00
Countermeasures 00:00:00
Section 3: Advanced Scriptable Shell
Dynamic DNS DDNS Outline 00:00:00
DDNS Aware Shell 00:00:00
Interacting with Twitter 00:00:00
Parsing Tweet in 3 Lines 00:00:00
Countermeasures 00:00:00
Replicating Metasploit Screen Capturing 00:00:00
Replicating Metasploit Searching for Content 00:00:00
Target Directory Navigation 00:00:00
Integrating Low Level Port Scanner 00:00:00
Section 4: Passwords Hacking
Anti-Virus Free Keylogger 00:00:00
Hijacking KeePass Password Manager 00:00:00
Man in the Browser Outline 00:00:00
FireFox API Hooking with ImmunityDebugger 00:00:00
Python in Firefox PoC 00:00:00
Exercise Python in Firefox EXE 00:00:00
Bonus Dumping Saved Passwords Out of Google Chrome 00:00:00
Bonus Exercise Dumping Saved Passwords Out of Google Chrome 00:00:00
Passwords Phishing – DNS Poisoning 00:00:00
In Action Facebook Password Phishing 00:00:00
Dont Skip Me – Countermeasures 00:00:00
Section 5: Catch Me If You Can
Bypassing Host Based Firewall Outline 00:00:00
Hijacking Internet Explorer – Shell Over Internet Explorer 00:00:00
Bypassing Reputation Filtering in Next Generation Firewalls – Outline 00:00:00
Interacting with Source Forge 00:00:00
Interacting with Google Forms 00:00:00
Exercise Putting All Together – Bypassing Botnet Filtering 00:00:00
Bypassing IPS with Hand-Made XOR Encryption 00:00:00
Section 6: Miscellaneous Fun in Windows
Privilege Escalation Part 1 – Weak Service File Permission Outline 00:00:00
Privilege Escalation Part 2 – Preparing Vulnerable Software 00:00:00
Privilege Escalation Part 3 – Backdoor-ing Legitmate Windows Service 00:00:00
Privilege Escalation Part 4 – Create a New Admin account Erasing Tracks 00:00:00
Section 7: Bonus How Malware Abuse Cryptography Python Answers
Quick Introudction To Encryption Algorithms 00:00:00
Protecting Your Tunnel with AES 00:00:00
Protecting Your Tunnel with RSA 00:00:00
Developing One Time, Hybrid – Encryption Key 00:00:00
Online Learning Thailand.
X