Python For Offensive PenTest: A Complete Practical Course
Python for Hacking , Learn how to use python for ethical hacking and penetration testing
When other's tools fail, writing your own makes you a true penetration tester!
Before You Enroll !
The knowledge which you will learn from this course is literally a weapon. My goal is to make you a better warrior in penetration testing. Consider the consequences of your actions, be smart and don't go to jail.
There are quite a lot of people who call themselves hackers but in reality few have the solid skills to fit the definition, when other's tools fail, writing your own makes you a true hacker!
---------------
FAQ
Why Python?
- Easy to learn
- Cross platform
- Unlimited third party libraries
- Get your job done with few lines
- Ranked as #1 for the most popular programming languages
- Plenty of open source hacking tools are written in python which can be easily integrated within your script
How To Use This Course?
- View the course in order, start from module 1 and move on.
- Before you see the video, download the script, read the inline comments, run the script in your home lab, then finally see the explanatory video, if you still got any question, post it in Udemy forum.
- Don't skip the exercises, Google is your best friend.
- Fall in love with Python, go for extra mile and start writing your own weapons!
Your Instructor
Hi! We are UpDegree, providing high quality interactive course.
We are the team of 100+ instructor over the globe. Adel (Oxford), Anand (Standford), Akash (IITB), Rajib (IITK), Partha (IITM) are few of them.
Updegree courses are different, In each and every course you not only get the videos lectures but you also get quiz,code,assignment etc to test your practical understanding!
Course Curriculum
-
StartHome Lab Setup - Preparing Attacker Machine - Kali linux (7:22)
-
StartHome Lab Setup - Preparing Target Machine - Windows 7 (4:33)
-
StartTCP Reverse Shell Outline (7:29)
-
StartCoding a TCP Reverse Shell (8:24)
-
StartData Exfiltration (5:56)
-
StartExporting To EXE (5:59)
-
StartHTTP Reverse Shell Outline (3:28)
-
StartCoding HTTP Reverse Shell In 5 Lines of Python! (7:52)
-
StartData Exfiltration (1:33)
-
StartExporting To EXE (4:45)
-
StartPersistence Outline (11:57)
-
StartMaking Putty.exe Persistant (4:28)
-
StartWrap up - Making a Persistant HTTP Reverse Shell (4:05)
-
StartTuning the connection attempts (4:22)
-
StartCountermeasures (14:49)
-
StartDynamic DNS (DDNS) Outline (3:42)
-
StartDDNS Aware Shell (3:00)
-
StartInteracting with Twitter (9:02)
-
StartParsing Tweet in 3 Lines! (1:40)
-
StartReplicating Metasploit "Screen Capturing" (7:51)
-
StartReplicating Metasploit "Searching for Content" (19:09)
-
StartTarget Directory Navigation (23:20)
-
StartIntegrating Low Level Port Scanner (3:51)
-
StartProtecting Your Tunnel with RSA (5:43)
-
StartProtecting Your Tunnel with AES (30:04)