Python For Offensive PenTest: A Complete Practical Course

When other's tools fail, writing your own makes you a true penetration tester!
4.4 (385 ratings) Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
3,930 students enrolled
$19
$100
81% off
Take This Course
  • Lectures 59
  • Length 6 hours
  • Skill Level Intermediate Level
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 8/2015 English

Course Description

Bonus#1 Update Dec 6, 2015 : Adding lectures 36,37

Bonus#2 Update Feb 10, 2016 : Adding a complete new section [Cryptography and Malware]

  • ALL the Scripts are downloadable - just plug and play!
  • It's an on-going Course, new contents will be added!

---------------

Before You Enroll !

The knowledge which you will learn from this course is literally a weapon. My goal is to make you a better warrior in penetration testing. Consider the consequences of your actions, be smart and don't go to jail.

"Assume your target is running unpatched Windows XP, Anti-Virus is disabled, firewall is turned off, IPS is not in place then you may (or not) get into their system !!" Does that sound like a real world penetration testing for you?

Whether you get bored from theory and basic courses which repeat the same tools and techniques over and over again and fail to teach you how to hack into even unsecured systems or you want to push your skills from beginner to the next level, then you have come to the right place!

There are quite a lot of people who call themselves hackers but in reality few have the solid skills to fit the definition, when other's tools fail, writing your own makes you a true hacker!

---------------

FAQ

Why Python?

  • Easy to learn
  • Cross platform
  • Unlimited third party libraries
  • Get your job done with few lines
  • Ranked as #1 for the most popular programming languages
  • Plenty of open source hacking tools are written in python which can be easily integrated within your script

How To Use This Course?

  1. View the course in order, start from module 1 and move on.
  2. Before you see the video, download the script, read the inline comments, run the script in your home lab, then finally see the explanatory video, if you still got any question, post it in Udemy forum.
  3. Don't skip the exercises, Google is your best friend.
  4. Fall in love with Python, go for extra mile and start writing your own weapons!

How to reach me?

  • Udemy forums in case you have ANY question or technical problem.
  • LinkedIn if you have ANY questions prior taking the course, Ideas and collaboration are welcomed.

What are the requirements?

  • Basic knowledge in Python or ANY other programming/scripting languages
  • Intermediate knowledge in penetration testing and ethical hacking

What am I going to get from this course?

  • Learn how to code your own reverse shell [TCP+HTTP]
  • Make anonymous shell by interacting with [Twitter, Google Form, Sourceforge]
  • Replicate Metasploit features and and make an advanced shell
  • Learn how to hack passwords using multiple techniques [ API Hooking. Keylogger, Clipboard Hijacking]
  • Learn how to exfiltrate data from your target
  • Learn how malware abusing cryptography by adding [AES,RSA,XOR] encryption to your shell
  • Privilege escalation on windows with practical example
  • Export your python script into EXE
  • You'll get answers to your questions!
  • You will setup your home virtual hacking lab
  • You will learn countermeasures against most of the attacks
  • Challenge yourself with UNSOLVED Exercises

What is the target audience?

  • Ethical hackers and penetration testers
  • Students preparing for OSCP, OSCE, GPEN, GXPN, CEH
  • Information security professionals and cyber security consultants
  • System and network security administrators
  • Programmers who want to get their hands dirty

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: Quick Into
Intro
Preview
02:35
Section 2: Warming up - Your First Anti-Virus Free Persistence Shell
Home Lab Setup - Preparing Attacker Machine - Kali linux
03:35
Home Lab Setup - Preparing Target Machine - Windows 7
06:54
TCP Reverse Shell Outline
04:25
Coding a TCP Reverse Shell
06:06
Data Exfiltration
07:28
Exporting To EXE
04:03
HTTP Reverse Shell Outline
02:40
Coding HTTP Reverse Shell In 5 Lines of Python!
06:39
Data Exfiltration
06:12
Exporting To EXE
02:35
Persistence Outline
03:57
Making Putty.exe Persistant
07:52
Wrap up - Making a Persistant HTTP Reverse Shell
07:09
Tuning the connection attempts
07:08
Final Notes
02:56
Countermeasures
02:01
Home Lab Setup - Download Link
Article
Download - Exercises + Scripts
Article
Section 3: Advanced Scriptable Shell
Dynamic DNS (DDNS) Outline
02:26
DDNS Aware Shell
04:42
Interacting with Twitter
02:12
Parsing Tweet in 3 Lines!
06:46
Countermeasures
03:39
Replicating Metasploit "Screen Capturing"
08:56
Replicating Metasploit "Searching for Content"
06:32
Target Directory Navigation
03:59
Integrating Low Level Port Scanner
07:48
Download - Exercises + Scripts
Article
Section 4: Passwords Hacking
Anti-Virus Free Keylogger
08:44
Hijacking KeePass Password Manager
06:53
Man in the Browser Outline
05:26
FireFox API Hooking with ImmunityDebugger
11:27
Python in Firefox PoC
09:16
Exercise: Python in Firefox EXE
Preview
06:31
Bonus: Dumping Saved Passwords Out of Google Chrome
14:34
Bonus: Exercise: Dumping Saved Passwords Out of Google Chrome
Preview
02:33
Passwords Phishing - DNS Poisoning
10:10
In Action: Facebook Password Phishing
10:30
Don't Skip Me! - Countermeasures
06:01
Download - Exercises + Scripts
Article
Section 5: Catch Me If You Can!
Bypassing Host Based Firewall Outline
05:31
Hijacking Internet Explorer - Shell Over Internet Explorer
07:13
Bypassing Reputation Filtering in Next Generation Firewalls - Outline
04:28
Interacting with Source Forge
13:29
Interacting with Google Forms
09:00
Exercise: Putting All Together - Bypassing Botnet Filtering
04:02
Bypassing IPS with Hand-Made XOR Encryption
10:54
Download - Exercises + Scripts
Article
Section 6: Miscellaneous Fun in Windows
Privilege Escalation Part 1 - Weak Service File Permission Outline
03:23
Privilege Escalation Part 2 - Preparing Vulnerable Software
08:10
Privilege Escalation Part 3 - Backdoor-ing Legitmate Windows Service
13:30
Privilege Escalation Part 4 - Create a New Admin account & Erasing Tracks
Preview
05:17
Download - Exercises + Scripts
Article
Section 7: +Bonus: How Malware Abuse Cryptography? Python Answers
Quick Introudction To Encryption Algorithms
10:14
Protecting Your Tunnel with AES
08:12
Protecting Your Tunnel with RSA
23:43
Developing One Time, Hybrid - Encryption Key
Preview
07:32
Download Scripts
Article

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Hussam Khrais, Senior Security Engineer, GPEN, CEH

Hussam Khrais is a senior security engineer with over 5 years in penetration testing, Python scripting and network security where he spends countless hours in forging custom hacking tools in Python.

Hussam currently holds the following certificates in information security:-

-GIAC Penetration Testing - GPEN

-Certified Ethical Hacker - CEH

-Cisco Certified Network Professional - Security (CCNP Security)

Favorite Quotes

"If you want peace, prepare for war"

"what one man can do, another can do"

"Keep your friends close, and your enemies closer."

"anything is possible, if you try hard enough"

“If I had eight hours to chop down a tree, I'd spend six hours sharpening my ax."

Ready to start learning?
Take This Course