×
Order Processing
Checkout
Full Name:
Email address:
Password:
Retype Password:
Existing User
Existing User
Continue
Exclusive features inside this offer:
30 Days Money Back Guarantee
Instant Certificate of Completion
Lifetime Access
Get up to date Information
Practical Knowledge
Best Teaching Methodology
Quick access, anytime & anywhere
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Using Python For Offensive Penetration Testing
Home Lab Setup
Intro (2:35)
Preparing Attacker Machine - Kali linux (3:36)
Preparing Target Machine - Windows 7 (6:56)
Download all the Scripts
Section 2: Warming up - Your First Anti-Virus Free Persistence Shell
TCP Reverse Shell Outline (4:27)
Coding a TCP Reverse Shell (6:06)
Data Exfiltration (7:28)
Exporting To EXE (4:03)
HTTP Reverse Shell Outline (2:41)
Coding HTTP Reverse Shell In 5 Lines of Python! (6:39)
Data Exfiltration (6:12)
Exporting To EXE (2:35)
Persistence Outline (7:52)
Making Putty.exe Persistant (3:58)
Wrap up - Making a Persistant HTTP Reverse Shell (7:09)
Tuning the connection attempts (7:08)
Final Notes (2:57)
Countermeasures (2:02)
Advanced Scriptable Shell
Dynamic DNS (DDNS) Outline (2:28)
DDNS Aware Shell (4:42)
Interacting with Twitter (2:13)
Parsing Tweet in 3 Lines! (6:46)
Countermeasures (3:40)
Replicating Metasploit "Screen Capturing" (8:58)
Replicating Metasploit "Searching for Content" (6:32)
Target Directory Navigation (3:59)
Integrating Low Level Port Scanner (7:48)
Passwords Hacking
Anti-Virus Free Keylogger (8:47)
Hijacking KeePass Password Manager (6:55)
Man in the Browser Outline (5:26)
FireFox API Hooking with ImmunityDebugger (11:27)
Python in Firefox PoC (9:16)
Exercise: Python in Firefox EXE (6:33)
Passwords Phishing - DNS Poisoning (10:10)
In Action: Facebook Password Phishing (10:30)
Don't Skip Me! - Countermeasures (6:03)
Catch Me If You Can!
Bypassing Host Based Firewall Outline (5:33)
Hijacking Internet Explorer - Shell Over Internet Explorer (7:13)
Bypassing Reputation Filtering in Next Generation Firewalls - Outline (4:30)
Interacting with Source Forge (13:29)
Interacting with Google Forms (9:02)
Exercise: Putting All Together - Bypassing Botnet Filtering (4:04)
Bypassing IPS with Hand-Made XOR Encryption (10:54)
Miscellaneous Fun in Windows
Privilege Escalation Part 1 - Weak Service File Permission Outline (3:25)
Privilege Escalation Part 2 - Preparing Vulnerable Software (8:12)
Privilege Escalation Part 3 - Backdoor-ing Legitmate Windows Service (13:30)
Privilege Escalation Part 4 - Create a New Admin account & Erasing Tracks (5:17)
In Action: Facebook Password Phishing
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock