Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Python for Offensive Penetration Testing
How to Setup Your Lab
Introduction to Python Penetration Testing (2:35)
Setting up Kali Linux - Attacker Machine (3:35)
Setting Up Windows 7 - Target Machine (6:54)
Setting Up Persistence Outline
How TCP Reverse Shell Outline Works (4:25)
How to Code a TCP Reverse Shell (6:06)
Performing Data Exfiltration (7:28)
Exporting Python Script To EXE File (4:03)
How HTTP Reverse Shell Outline Works (2:40)
Coding HTTP Reverse Shell (6:39)
File Transfer From Target to Attacker Machine (6:12)
Exporting HTTP Reversion To EXE (2:35)
Creating a Persistent Code (7:52)
Making Putty.exe Persistant (3:57)
Demonstrating Persistant HTTP Reverse Shell (7:09)
Aligning The Server Connection Attempts (7:08)
Important Keynotes (2:56)
Implying Effective Countermeasures (2:01)
Advanced Scriptable Shell
Introduction to Dynamic DNS (DDNS) (2:26)
How Does DDNS Aware Shell Work (4:42)
Relying on Servers for Information Transfer (2:12)
Demonstrating Data Grabbing from Target Machine (6:46)
Possible Countermeasures to Combat Malware (3:39)
Replicating Metasploit Screen Capturing (8:56)
How to Replicate Metasploit Searching for Content (6:32)
Target Directory Navigation (3:59)
Integrating Low Level Port Scanner (7:48)
Passwords Hacking
Using Keylogger in Python (8:44)
Using KeePass Password Manager (6:53)
Conditional Performance of Keylogger (5:26)
Using Immunity Debugger for FireFox API Hooking (11:27)
Python in Firefox Proof of Concept (PoC) (9:16)
Practice Session: Python in Firefox EXE (6:31)
Passwords Phishing Using DNS Poisoning (10:10)
Demonstration: Attacking DNS Record for Facebook (10:30)
Countermeasures to Securing Online Account (6:01)
Tracker the Hacker / Attacker
Firewall Basic Bypassing Techniques (5:31)
Browser Hijacking - Shell Over Internet Explorer (7:13)
How to Bypass Next Generation Firewalls (4:28)
Interacting with Sourceforge in Python (13:29)
Interacting with Google Forms in Python (9:00)
Practice Session - Bypassing Botnet Filtering (4:02)
How to Bypass IPS with Hand-Made XOR Encryption (10:54)
Introduction to Python Penetration Testing
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock