Autoplay
Autocomplete
Speed
Previous Lecture
Complete and Continue
Python For Offensive PenTest: A Complete Practical Course
Getting Started to Python For Offensive PenTest
Home Lab Setup - Preparing Attacker Machine - Kali linux (7:22)
Home Lab Setup - Preparing Target Machine - Windows 7 (4:33)
TCP Reverse Shell Outline (7:29)
Coding a TCP Reverse Shell (8:24)
Data Exfiltration (5:56)
Exporting To EXE (5:59)
HTTP Reverse Shell Outline (3:28)
Coding HTTP Reverse Shell In 5 Lines of Python! (7:52)
Data Exfiltration (1:33)
Exporting To EXE (4:45)
Persistence Outline (11:57)
Making Putty.exe Persistant (4:28)
Wrap up - Making a Persistant HTTP Reverse Shell (4:05)
Tuning the connection attempts (4:22)
Countermeasures (14:49)
Dynamic DNS (DDNS) Outline (3:42)
DDNS Aware Shell (3:00)
Interacting with Twitter (9:02)
Parsing Tweet in 3 Lines! (1:40)
Replicating Metasploit "Screen Capturing" (7:51)
Replicating Metasploit "Searching for Content" (19:09)
Target Directory Navigation (23:20)
Integrating Low Level Port Scanner (3:51)
Protecting Your Tunnel with RSA (5:43)
Protecting Your Tunnel with AES (30:04)
Parsing Tweet in 3 Lines!
Lecture content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock