Python 3 For Offensive PenTest: A Complete Practical Course
4.4 (1,044 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
11,306 students enrolled

Python 3 For Offensive PenTest: A Complete Practical Course

2019 Updated Python 3 / Windows 10 & Kali 2. Learn how to use python for ethical hacking and penetration testing
4.4 (1,044 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
11,306 students enrolled
Created by Hussam Khrais
Last updated 1/2019
English
English [Auto-generated], Indonesian [Auto-generated], 4 more
  • Polish [Auto-generated]
  • Romanian [Auto-generated]
  • Spanish [Auto-generated]
  • Thai [Auto-generated]
Current price: $54.99 Original price: $99.99 Discount: 45% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 5 hours on-demand video
  • 15 articles
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 3,500+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Learn how to code your own reverse shell [TCP+HTTP]
  • Learn how to exfiltrate data from your target
  • Make anonymous shell by interacting with [Twitter, Google Form, Sourceforge]
  • Replicate Metasploit features and and make an advanced shell
  • Learn how to hack passwords using multiple techniques [Keylogger, Clipboard Hijacking]
  • Learn how malware abusing cryptography by adding [AES,RSA,XOR] encryption to your shell
  • Privilege escalation on windows with practical example
Requirements
  • Basic knowledge in Python or ANY other programming/scripting languages
  • Intermediate knowledge in penetration testing and ethical hacking
Description

When other's tools fail, writing your own makes you a true penetration tester!
---------------
         

Before You Enroll !

The knowledge which you will learn from this course is literally a weapon. My goal is to make you a better warrior in penetration testing. Consider the consequences of your actions, be smart and don't go to jail.

There are quite a lot of people who call themselves hackers but in reality few have the solid skills to fit the definition, when other's tools fail, writing your own makes you a true hacker!

---------------

FAQ

Why Python?

  • Easy to learn

  • Cross platform

  • Unlimited third party libraries

  • Get your job done with few lines

  • Ranked as #1 for the most popular programming languages

  • Plenty of open source hacking tools are written in python which can be easily integrated within your script

How To Use This Course?

  1. View the course in order, start from module 1 and move on.

  2. Before you see the video, download the script, read the inline comments, run the script in your home lab, then finally see the explanatory video, if you still got any question, post it in Udemy forum.

  3. Don't skip the exercises, Google is your best friend.

  4. Fall in love with Python, go for extra mile and start writing your own weapons!

How to reach me?

  • Udemy forums in case you have ANY question or technical problem.

  • LinkedIn if you have ANY questions prior taking the course, Ideas and collaboration are welcomed.

Who this course is for:
  • Ethical hackers and penetration testers
  • Students preparing for OSCP, OSCE, GPEN, GXPN, CEH
  • Information security professionals and cyber security consultants
  • System and network security administrators
  • Programmers who want to get their hands dirty
Course content
Expand all 58 lectures 04:56:13
+ Quick Intro
2 lectures 02:43
Preparing Kali 2 linux & Windows 10
00:48
+ Python 3 / Windows 10 / Kali 2 : Gaining Access - Your First Persistence Shell
16 lectures 01:14:42
Download Scripts
00:04
TCP Reverse Shell Outline
04:50
Server Side - Coding a TCP Reverse Shell
07:46
Client Side - Coding a TCP Reverse Shell
08:44
Exercise: Overcome Empty String
00:18
Coding a Low Level Data Exfiltration
07:11
Exporting To EXE
02:52
Exercise: Downloading Tools From Hacker Machine
00:24
HTTP Reverse Shell Outline
02:36
Coding a HTTP Reverse Shell
11:06
Data Exfiltration
07:54
Exercise: Switching user-agent value
00:16
Persistence Outline
04:29
Tuning the connection attempts
04:24
Final Notes & Countermeasures
01:39
+ Python 3 / Windows 10 / Kali 2 : Advanced Scriptable Shell
8 lectures 38:40
Download Scripts
00:04
DDNS Aware Shell
05:28
Interacting with Twitter
09:49
Exercise: Twitter as DDNS? Tweet your Kali IP:port
00:22
Target Directory Navigation
06:45
Replicating Metasploit "Screen Capturing"
04:54
Replicating Metasploit "Searching for Content"
05:49
Integrating Low Level Port Scanner
05:29
+ Python 3 / Windows 10 / Kali 2 : Catch Me If You Can!
7 lectures 22:19
Download Scripts
00:04
Bypassing Host Based Firewall Outline
03:24
Bypassing Reputation Filtering in Next Generation Firewalls - Outline
02:56
Interacting with Source Forge
05:49
Interacting with Google Forms
04:55
Exercise: Putting All Together - Bypassing Botnet Filtering
00:06
+ Python 3: How Malware Abuse Cryptography? Python Answers
6 lectures 40:48
Download Scripts
00:03
Bypassing IPS with Hand-Made XOR Encryption
07:27
Quick Introduction To Encryption Algorithms
07:05
Protecting Your Tunnel with AES
08:57
Protecting Your Tunnel with RSA
12:41
Developing One Time, Hybrid - Encryption Key
04:35
+ Python 3 / Windows 10 / Kali 2 : Passwords Hacking
14 lectures 01:26:28
Download Scripts
00:03
Keylogger
02:27
Quick note
00:21
Hijacking KeePass Password Manager
06:53
Bonus: Dumping Saved Passwords Out of Google Chrome
14:34
Bonus: Exercise: Dumping Saved Passwords Out of Google Chrome
02:33
Quick note
00:15
Man in the Browser Outline
05:26
FireFox API Hooking with ImmunityDebugger
11:27
Python in Firefox PoC
09:16
Exercise: Python in Firefox EXE
06:31
Passwords Phishing - DNS Poisoning
10:10
In Action: Facebook Password Phishing
10:30
Don't Skip Me! - Countermeasures
06:01
+ Windows 7 & 10 Privilege Escalation - Weak Service Permission
5 lectures 30:47
Download - Exercises + Scripts
00:27
Privilege Escalation Part 1 - Weak Service File Permission Outline
03:23
Privilege Escalation Part 2 - Preparing Vulnerable Software
08:10
Privilege Escalation Part 3 - Backdoor-ing Legitmate Windows Service
13:30