Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Development Tools No-Code Development
Business
Entrepreneurship Communications Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certification Network & Security Hardware Operating Systems Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design Design Thinking 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition Yoga Mental Health Dieting Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Teacher Training Test Prep Other Teaching & Academics
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Cisco CCNA Amazon AWS CompTIA Security+ Microsoft AZ-900
Graphic Design Photoshop Adobe Illustrator Drawing Digital Painting InDesign Character Design Canva Figure Drawing
Life Coach Training Neuro-Linguistic Programming Mindfulness Personal Development Meditation Personal Transformation Life Purpose Emotional Intelligence CBT
Web Development JavaScript React CSS Angular PHP WordPress Node.Js Python
Digital Marketing Google Ads (Adwords) Social Media Marketing Google Ads (AdWords) Certification Marketing Strategy Internet Marketing YouTube Marketing Email Marketing Retargeting
SQL Microsoft Power BI Tableau Business Analysis Business Intelligence MySQL Data Analysis Data Modeling Big Data
Business Fundamentals Entrepreneurship Fundamentals Business Strategy Online Business Business Plan Startup Freelancing Blogging Home Business
Unity Game Development Fundamentals Unreal Engine C# 3D Game Development C++ 2D Game Development Unreal Engine Blueprints Blender
30-Day Money-Back Guarantee
IT & Software Network & Security Python

Python 3 For Offensive PenTest: A Complete Practical Course

Updated Python 3.7 / Windows 10 & Kali 2. Learn how to use python for ethical hacking and penetration testing
Rating: 4.4 out of 54.4 (1,351 ratings)
14,370 students
Created by Hussam Khrais
Last updated 5/2020
English
English [Auto], Indonesian [Auto], 
30-Day Money-Back Guarantee

What you'll learn

  • Learn how to code your own reverse shell [TCP+HTTP]
  • Learn how to exfiltrate data from your target
  • Make anonymous shell by interacting with [Twitter, Google Form, Sourceforge]
  • Replicate Metasploit features and and make an advanced shell
  • Learn how to hack passwords using multiple techniques [Keylogger, Clipboard Hijacking]
  • Learn how malware abusing cryptography by adding [AES,RSA,XOR] encryption to your shell
  • Privilege escalation on windows with practical example
Curated for the Udemy for Business collection

Requirements

  • Basic knowledge in Python or ANY other programming/scripting languages
  • Intermediate knowledge in penetration testing and ethical hacking

Description

When other's tools fail, writing your own makes you a true penetration tester!
---------------
         

Before You Enroll !

The knowledge which you will learn from this course is literally a weapon. My goal is to make you a better warrior in penetration testing. Consider the consequences of your actions, be smart and don't go to jail.

There are quite a lot of people who call themselves hackers but in reality few have the solid skills to fit the definition, when other's tools fail, writing your own makes you a true hacker!

---------------

FAQ

Why Python?

  • Easy to learn

  • Cross platform

  • Unlimited third party libraries

  • Get your job done with few lines

  • Ranked as #1 for the most popular programming languages

  • Plenty of open source hacking tools are written in python which can be easily integrated within your script

How To Use This Course?

  1. View the course in order, start from module 1 and move on.

  2. Before you see the video, download the script, read the inline comments, run the script in your home lab, then finally see the explanatory video, if you still got any question, post it in Udemy forum.

  3. Don't skip the exercises, Google is your best friend.

  4. Fall in love with Python, go for extra mile and start writing your own weapons!

How to reach me?

  • Udemy forums in case you have ANY question or technical problem.

  • LinkedIn if you have ANY questions prior taking the course, Ideas and collaboration are welcomed.

Who this course is for:

  • Ethical hackers and penetration testers
  • Students preparing for OSCP, OSCE, GPEN, GXPN, CEH
  • Information security professionals and cyber security consultants
  • System and network security administrators
  • Programmers who want to get their hands dirty

Course content

7 sections • 58 lectures • 4h 56m total length

  • Preview01:55
  • Preparing Kali 2 linux & Windows 10
    00:43

  • Download Scripts
    00:03
  • TCP Reverse Shell Outline
    04:50
  • Server Side - Coding a TCP Reverse Shell
    07:46
  • Client Side - Coding a TCP Reverse Shell
    08:44
  • Exercise: Overcome Empty String
    00:18
  • Coding a Low Level Data Exfiltration
    07:11
  • Exporting To EXE
    02:52
  • Exercise: Downloading Tools From Hacker Machine
    00:23
  • HTTP Reverse Shell Outline
    02:36
  • Coding a HTTP Reverse Shell
    11:06
  • Data Exfiltration
    07:54
  • Exercise: Switching user-agent value
    00:16
  • Persistence Outline
    04:29
  • Preview10:07
  • Tuning the connection attempts
    04:24
  • Final Notes & Countermeasures
    01:38

  • Download Scripts
    00:03
  • DDNS Aware Shell
    05:28
  • Interacting with Twitter
    09:49
  • Exercise: Twitter as DDNS? Tweet your Kali IP:port
    00:22
  • Target Directory Navigation
    06:45
  • Replicating Metasploit "Screen Capturing"
    04:54
  • Replicating Metasploit "Searching for Content"
    05:49
  • Integrating Low Level Port Scanner
    05:29

  • Download Scripts
    00:03
  • Bypassing Host Based Firewall Outline
    03:24
  • Preview05:04
  • Bypassing Reputation Filtering in Next Generation Firewalls - Outline
    02:56
  • Interacting with Source Forge
    05:49
  • Interacting with Google Forms
    04:55
  • Exercise: Putting All Together - Bypassing Botnet Filtering
    00:06

  • Download Scripts
    00:02
  • Bypassing IPS with Hand-Made XOR Encryption
    07:27
  • Quick Introduction To Encryption Algorithms
    07:05
  • Protecting Your Tunnel with AES
    08:57
  • Protecting Your Tunnel with RSA
    12:41
  • Developing One Time, Hybrid - Encryption Key
    04:35

  • Download Scripts
    00:02
  • Keylogger
    02:27
  • Quick note
    00:20
  • Hijacking KeePass Password Manager
    06:53
  • Bonus: Dumping Saved Passwords Out of Google Chrome
    14:34
  • Bonus: Exercise: Dumping Saved Passwords Out of Google Chrome
    02:33
  • Quick note
    00:14
  • Man in the Browser Outline
    05:26
  • FireFox API Hooking with ImmunityDebugger
    11:27
  • Python in Firefox PoC
    09:16
  • Exercise: Python in Firefox EXE
    06:31
  • Passwords Phishing - DNS Poisoning
    10:10
  • In Action: Facebook Password Phishing
    10:30
  • Don't Skip Me! - Countermeasures
    06:01

  • Download - Exercises + Scripts
    00:27
  • Privilege Escalation Part 1 - Weak Service File Permission Outline
    03:23
  • Privilege Escalation Part 2 - Preparing Vulnerable Software
    08:10
  • Privilege Escalation Part 3 - Backdoor-ing Legitmate Windows Service
    13:30
  • Preview05:17

Instructor

Hussam Khrais
Cloud Security Engineer at Amazon AWS
Hussam Khrais
  • 4.4 Instructor Rating
  • 1,401 Reviews
  • 15,330 Students
  • 2 Courses

Hi, My name is Hussam.

I'm a security engineer based in Berlin, Germany. I build security tools and scanners in Python.

I do my best to learn as much as i can. I enjoy solving problems and turning obstacles upside down.

My favorite quote, "What stands in the way becomes the way"

  • Udemy for Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Featured courses
Udemy
© 2021 Udemy, Inc.