It & Software Online Course by Udemy, On Sale Here
Learn how to write your own python Security scripts during any ethical hacking operation to get the job done like a PRO
An excellent training about Network & Security
Offensive Python Mastering Ethical Hacking Using Python
NOTE: I update this course monthly, so maybe you can see some sections with few lectures, especially for buffer overflow section, so don’t worry about that: )This course will teach you how to use python programming languageduring any penetration testing or ethical hacking operation, it will teach you how to write your own ethicalhacking scripts on various information security fields like network security, web application security, and endpoint security. Also this course will teach you how to deal with buffer overflowvulnerabilities on windows machines and how you can write fully customized fuzzers to help you in exploitation stage. Each section of this course will be awonderful journey, I will talk about a lot of interesting topics about each section, I will teachyou how to think in a practical way to solve a lot of programmatic problems that you could face during any penetration testing operation. First, we will talk about how you can build your own lab with simple network configuration, then we will talk aboutNetcat and how we can use it, because you need to know how we can send and receive databetween the attacker machine and the target machine, Then we will talk aboutPython sockets, sockets type and where we can use each type, and also we will learn how we can use sockets to build a simple port scannerThen we will talk aboutTOR network, and how we can build python scripts to performanonymous penetration testing through TOR network using SOCKS, I will teach youmultipletechniques to build the same scripts, because it’s really important to train the student how he can use this techniques during penetration testing. Also in this course, I talked about veryinteresting topic which is how we can write aPython wifi jammer, to jam on wifi networks, I talked about the theory that I will use, then we will write the code. For web application security, I talked about some great topics about how we can handle a http requests in python and how we can use some libraries such as urllib2, urllib to communicate with web servers without any problem, We will write a lot ofinteresting tools such asWeb shell controller, authentication system cracker, and a lot of otherinteresting topics. In the endpoint security section, I will focused on how you can build your owncommand line shells that works on linux and windows without any problems, and the types of this shells, we talked aboutreverse shell and bind shell, and how we can build a protected bind shell, and how you can usemultiple techniques to execute commands on systems and bypass some securityrestrictions, I also talked about how we can convert python scripts to exe files on windows OS and ELF files on Linux OS and we will talk about how we can build python rootkit for linux that with hidden process. In encryption basics section, I talked about a lot of useful things that you can use using python, such as hashing, creating rainbow tables, finally I will teach youhow we can build a encrypted reverse shell with ssl. Finally, the buffer overflow section, I will teach you how you can exploit a simple stack buffer overflowvulnerabilities on windows OS using python scripts, I will talk about just the basics of buffer overflow, and I will talk about the general topics only.
Udemy is the leading global marketplace for learning and instruction
By connecting students all over the world to the best instructors, Udemy is helping individuals reach their goals and pursue their dreams.
Study anytime, anywhere.
Reviews
There are no reviews yet.