Learn how to code your own reverse shell [TCP+HTTP]
Learn how to exfiltrate data from your target
Make anonymous shell by interacting with [Twitter, Google Form, Sourceforge]
Replicate Metasploit features and and make an advanced shell
Learn how to hack passwords using multiple techniques [Keylogger, Clipboard Hijacking]
Learn how malware abusing cryptography by adding [AES,RSA,XOR] encryption to your shell
Privilege escalation on windows with practical example
Basic knowledge in Python or ANY other programming/scripting languages
Intermediate knowledge in penetration testing and ethical hacking
When other's tools fail, writing your own makes you a true penetration tester! ---------------
Before You Enroll !
The knowledge which you will learn from this course is literally a weapon. My goal is to make you a better warrior in penetration testing. Consider the consequences of your actions, be smart and don't go to jail.
There are quite a lot of people who call themselves hackers but in reality few have the solid skills to fit the definition, when other's tools fail, writing your own makes you a true hacker!
Easy to learn
Unlimited third party libraries
Get your job done with few lines
Ranked as #1 for the most popular programming languages
Plenty of open source hacking tools are written in python which can be easily integrated within your script
How To Use This Course?
View the course in order, start from module 1 and move on.
Before you see the video, download the script, read the inline comments, run the script in your home lab, then finally see the explanatory video, if you still got any question, post it in Udemy forum.
Don't skip the exercises, Google is your best friend.
Fall in love with Python, go for extra mile and start writing your own weapons!
How to reach me?
Udemy forums in case you have ANY question or technical problem.
LinkedIn if you have ANY questions prior taking the course, Ideas and collaboration are welcomed.
Who this course is for:
Ethical hackers and penetration testers
Students preparing for OSCP, OSCE, GPEN, GXPN, CEH
Information security professionals and cyber security consultants
System and network security administrators
Programmers who want to get their hands dirty
7 sections • 58 lectures • 4h 56m total length
Preparing Kali 2 linux & Windows 10
TCP Reverse Shell Outline
Server Side - Coding a TCP Reverse Shell
Client Side - Coding a TCP Reverse Shell
Exercise: Overcome Empty String
Coding a Low Level Data Exfiltration
Exporting To EXE
Exercise: Downloading Tools From Hacker Machine
HTTP Reverse Shell Outline
Coding a HTTP Reverse Shell
Exercise: Switching user-agent value
Tuning the connection attempts
Final Notes & Countermeasures
DDNS Aware Shell
Interacting with Twitter
Exercise: Twitter as DDNS? Tweet your Kali IP:port
Target Directory Navigation
Replicating Metasploit "Screen Capturing"
Replicating Metasploit "Searching for Content"
Integrating Low Level Port Scanner
Bypassing Host Based Firewall Outline
Bypassing Reputation Filtering in Next Generation Firewalls - Outline
Interacting with Source Forge
Interacting with Google Forms
Exercise: Putting All Together - Bypassing Botnet Filtering
Bypassing IPS with Hand-Made XOR Encryption
Quick Introduction To Encryption Algorithms
Protecting Your Tunnel with AES
Protecting Your Tunnel with RSA
Developing One Time, Hybrid - Encryption Key
Hijacking KeePass Password Manager
Bonus: Dumping Saved Passwords Out of Google Chrome
Bonus: Exercise: Dumping Saved Passwords Out of Google Chrome
Man in the Browser Outline
FireFox API Hooking with ImmunityDebugger
Python in Firefox PoC
Exercise: Python in Firefox EXE
Passwords Phishing - DNS Poisoning
In Action: Facebook Password Phishing
Don't Skip Me! - Countermeasures
Download - Exercises + Scripts
Privilege Escalation Part 1 - Weak Service File Permission Outline
Privilege Escalation Part 2 - Preparing Vulnerable Software
Privilege Escalation Part 3 - Backdoor-ing Legitmate Windows Service