O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Python For Offensive PenTest: A Complete Practical Course

Video Description

Python for Hacking , Learn how to use python for ethical hacking and penetration testing

About This Video

  • Easy to learn
  • Cross platform
  • Unlimited third party libraries
  • Get your job done with few lines
  • Ranked as #1 for the most popular programming languages
  • Plenty of open source hacking tools are written in python which can be easily integrated within your script

In Detail

The knowledge which you will learn from this course is literally a weapon. My goal is to make you a better warrior in penetration testing. Consider the consequences of your actions, be smart and don't go to jail. There are quite a lot of people who call themselves hackers but in reality few have the solid skills to fit the definition, when other's tools fail, writing your own makes you a true hacker!. View the course in order, start from module 1 and move on. Before you see the video, download the script, read the inline comments, run the script in your home lab, then finally see the explanatory video, don't skip the exercises, Google is your best friend. Fall in love with Python, go for extra mile and start writing your own weapons!

Table of Contents

  1. Chapter 1 : Quick Intro
    1. Introduction 00:02:06
  2. Chapter 2 : Warming up - Your First Anti-Virus Free Persistence Shell
    1. Home Lab Setup - Preparing Attacker Machine - Kali linux 00:03:36
    2. Home Lab Setup - Preparing Target Machine - Windows 7 00:06:55
    3. TCP Reverse Shell Outline 00:04:25
    4. Coding a TCP Reverse Shell 00:06:07
    5. Data Exfiltration 00:07:28
    6. Exporting To EXE 00:04:04
    7. HTTP Reverse Shell Outline 00:02:40
    8. Coding HTTP Reverse Shell In 5 Lines of Python! 00:06:40
    9. Data Exfiltration 00:06:12
    10. Exporting To EXE 00:02:35
    11. Persistence Outline 00:03:57
    12. Making Putty.exe Persistant 00:07:52
    13. Wrap up - Making a Persistant HTTP Reverse Shell 00:07:09
    14. Tuning the connection attempts 00:07:09
    15. Final Notes 00:02:57
    16. Countermeasures 00:02:02
  3. Chapter 3 : Advanced Scriptable Shell
    1. Dynamic DNS DDNS Outline 00:02:27
    2. DDNS Aware Shell 00:04:43
    3. Interacting with Twitter 00:02:13
    4. Parsing Tweet in 3 Lines! 00:06:47
    5. Countermeasures 00:03:40
    6. Replicating Metasploit "Screen Capturing" 00:08:56
    7. Replicating Metasploit "Searching for Content" 00:06:33
    8. Target Directory Navigation 00:04:00
    9. Integrating Low Level Port Scanner 00:07:49
  4. Chapter 4 : Passwords Hacking
    1. Anti-Virus Free Keylogger 00:08:45
    2. Hijacking KeePass Password Manager 00:06:54
    3. Man in the Browser Outline 00:05:27
    4. FireFox API Hooking with ImmunityDebugger 00:11:27
    5. Python in Firefox PoC 00:09:17
    6. Exercise: Python in Firefox EXE 00:06:31
    7. Bonus: Dumping Saved Passwords Out of Google Chrome 00:14:35
    8. Bonus: Exercise: Dumping Saved Passwords Out of Google Chrome 00:02:33
    9. Passwords Phishing - DNS Poisoning 00:10:10
    10. In Action: Facebook Password Phishing 00:10:30
    11. Don't Skip Me! – Countermeasures 00:06:02
  5. Chapter 5 : Catch Me If You Can!
    1. Bypassing Host Based Firewall Outline 00:05:31
    2. Hijacking Internet Explorer - Shell Over Internet Explorer 00:07:13
    3. Bypassing Reputation Filtering in Next Generation Firewalls – Outline 00:04:28
    4. Interacting with Source Forge 00:13:30
    5. Interacting with Google Forms 00:09:01
    6. Exercise: Putting All Together - Bypassing Botnet Filtering 00:04:02
    7. Bypassing IPS with Hand-Made XOR Encryption 00:10:55
  6. Chapter 6 : Miscellaneous Fun in Windows
    1. Privilege Escalation Part 1 - Weak Service File Permission Outline 00:03:24
    2. Privilege Escalation Part 2 - Preparing Vulnerable Software 00:08:10
    3. Privilege Escalation Part 3 - Backdoor-ing Legitmate Windows Service 00:13:31
    4. Privilege Escalation Part 4 - Create a New Admin account & Erasing Tracks 00:05:18
  7. Chapter 7 : +Bonus: How Malware Abuse Cryptography? Python Answers
    1. Quick Introduction To Encryption Algorithms 00:10:14
    2. Protecting Your Tunnel with AES 00:08:13
    3. Protecting Your Tunnel with RSA 00:23:43
    4. Developing One Time, Hybrid - Encryption Key 00:07:33