- 6 Sections
- 41 Lessons
- Lifetime
Expand all sectionsCollapse all sections
- Python 3 Windows 10 Kali 2 Gaining Access - Your First Persistence ShellTCP Reverse Shell Outline And Server Side - Coding a TCP Reverse Shell And Client Side - Coding a TCP Reverse Shell And Coding a Low Level Data Exfiltration And Exporting To EXE And HTTP Reverse Shell Outline And Coding a HTTP Reverse Shell And Data Exfiltration And Persistence Outline And Making our HTTP Reverse Shell Persistent And Tuning the connection attempts11
- 1.1TCP Reverse Shell Outline Lessons 15 Minutes
- 1.2Server Side – Coding a TCP Reverse Shell Lessons 28 Minutes
- 1.3Client Side – Coding a TCP Reverse Shell Lessons 39 Minutes
- 1.4Coding a Low Level Data Exfiltration Lessons 48 Minutes
- 1.5Exporting To EXE Lessons 53 Minutes
- 1.6HTTP Reverse Shell Outline Lessons 63 Minutes
- 1.7Coding a HTTP Reverse Shell Lessons 712 Minutes
- 1.8Data Exfiltration Lessons 88 Minutes
- 1.9Persistence Outline Lessons 95 Minutes
- 1.10Making our HTTP Reverse Shell Persistent Lessons 1011 Minutes
- 1.11Tuning the connection attempts Lessons 115 Minutes
- Python 3 Windows 10 Kali 2 Advanced Scriptable ShellDDNS Aware Shell And Interacting with Twitter And Target Directory Navigation And Replicating Metasploit Screen Capturing And Replicating Metasploit Searching for Content And Integrating Low Level Port Scanner6
- 2.1DDNS Aware Shell Lessons 16 Minutes
- 2.2Interacting with Twitter Lessons 210 Minutes
- 2.3Target Directory Navigation Lessons 37 Minutes
- 2.4Replicating Metasploit Screen Capturing Lessons 45 Minutes
- 2.5Replicating Metasploit Searching for Content Lessons 56 Minutes
- 2.6Integrating Low Level Port Scanner Lessons 66 Minutes
- Python 3 Windows 10 Kali 2 Catch Me If You Can!Bypassing Host Based Firewall Outline And Hijacking Internet Explorer - Shell Over Internet Explorer And Bypassing Reputation Filtering in Next Generation Firewalls - Outline And 005 Interacting with Source Forge And Interacting with Google Forms5
- 3.1Bypassing Host Based Firewall Outline Lessons 14 Minutes
- 3.2Hijacking Internet Explorer – Shell Over Internet Explorer Lessons 26 Minutes
- 3.3Bypassing Reputation Filtering in Next Generation Firewalls – Outline – Lessons 33 Minutes
- 3.4005 Interacting with Source Forge Lessons 46 Minutes
- 3.5Interacting with Google Forms – Lessons 55 Minutes
- Python 3 How Malware Abuse Cryptography Python AnswersBypassing IPS with Hand-Made XOR Encryption And Quick Introduction To Encryption Algorithms And Protecting Your Tunnel with AES And Protecting Your Tunnel with RSA And Developing One Time, Hybrid - Encryption Key Lessons5
- 4.1Bypassing IPS with Hand-Made XOR Encryption Lessons 18 Minutes
- 4.2Quick Introduction To Encryption Algorithms Lessons 28 Minutes
- 4.3Protecting Your Tunnel with AES Lessons 39 Minutes
- 4.4Protecting Your Tunnel with RSA Lessons 413 Minutes
- 4.5Developing One Time, Hybrid – Encryption Key Lessons 55 Minutes
- Python 3 Windows 10 Kali 2 Passwords HackingKeylogger And Hijacking KeePass Password Manager And Bonus Dumping Saved Passwords Out of Google Chrome And Bonus Exercise Dumping Saved Passwords Out of Google Chrome And 009 FireFox API Hooking with ImmunityDebugger And Python in Firefox PoC And Exercise Python in Firefox EXE And Passwords Phishing - DNS Poisoning And In Action Facebook Password Phishing And Don't Skip Me! - Countermeasures10
- 5.1Keylogger Lessons 13 Minutes
- 5.2Hijacking KeePass Password Manager Lessons 27 Minutes
- 5.3Bonus Dumping Saved Passwords Out of Google Chrome Lessons 315 Minutes
- 5.4Bonus Exercise Dumping Saved Passwords Out of Google Chrome Lessons 43 Minutes
- 5.5FireFox API Hooking with ImmunityDebugger Lessons 512 Minutes
- 5.6Python in Firefox PoC -Lessons 610 Minutes
- 5.7Exercise Python in Firefox EXE Lessons 77 Minutes
- 5.8Passwords Phishing – DNS Poisoning Lessons 811 Minutes
- 5.9In Action Facebook Password Phishing Lessons 911 Minutes
- 5.10Don’t Skip Me! – Countermeasures Lessons 107 Minutes
- Windows 7 & 10 Privilege Escalation - Weak Service PermissionPrivilege Escalation Part 1 - Weak Service File Permission Outline And Privilege Escalation Part 2 - Preparing Vulnerable Software And Privilege Escalation Part 3 - Backdoor-ing Legitmate Windows Service And Privilege Escalation Part 4 - Create a New Admin account & Erasing Tracks4
- 6.1Privilege Escalation Part 1 – Weak Service File Permission Outline – Lessons 14 Minutes
- 6.2Privilege Escalation Part 2 – Preparing Vulnerable Software – Lessons 29 Minutes
- 6.3Privilege Escalation Part 3 – Backdoor-ing Legitmate Windows Service Lessons 314 Minutes
- 6.4Privilege Escalation Part 4 – Create a New Admin account & Erasing Tracks Lessons 45 Minutes
