Catch Me If You Can!

In today's world, bypassing and hijacking software is all over the internet. However, clear usage and execution is what makes you a good amateur hacker.

This can be achieved by choosing your tools correctly and following the necessary processes to complete the tasks at hand impeccably.

In this chapter, we'll cover the following topics to help you achieve this:

  • Bypassing host-based firewalls
  • Hijacking IE
  • Bypassing repudiation filtering
  • Interacting with SourceForge
  • Interacting with Google Forms
  • Bypassing botnet filtering
  • Bypassing IPS with handmade XOR encryption

Get Python for Offensive PenTest now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.