Quick Intro
  • Course Intro
  • Preparing Kali 2 linux & Windows 10
Python 3 / Windows 10 / Kali 2 : Gaining Access - Your First Persistence Shell
  • Download Scripts
  • TCP Reverse Shell Outline
  • Server Side - Coding a TCP Reverse Shell
  • Client Side - Coding a TCP Reverse Shell
  • Exercise: Overcome Empty String
  • Coding a Low Level Data Exfiltration
  • Exporting To EXE
  • Exercise: Downloading Tools From Hacker Machine
  • HTTP Reverse Shell Outline
  • Coding a HTTP Reverse Shell
  • Data Exfiltration
  • Exercise: Switching user-agent value
  • Persistence Outline
  • Making our HTTP Reverse Shell Persistent
  • Tuning the connection attempts
  • Final Notes & Countermeasures
Python 3 / Windows 10 / Kali 2 : Advanced Scriptable Shell
  • Download Scripts
  • DDNS Aware Shell
  • Interacting with Twitter
  • Exercise: Twitter as DDNS? Tweet your Kali IP:port
  • Target Directory Navigation
  • Replicating Metasploit "Screen Capturing"
  • Replicating Metasploit "Searching for Content"
  • Integrating Low Level Port Scanner
Python 3 / Windows 10 / Kali 2 : Catch Me If You Can!
  • Download Scripts
  • Bypassing Host Based Firewall Outline
  • Hijacking Internet Explorer - Shell Over Internet Explorer
  • Bypassing Reputation Filtering in Next Generation Firewalls - Outline
  • Interacting with Source Forge
  • Interacting with Google Forms
  • Exercise: Putting All Together - Bypassing Botnet Filtering
Python 3: How Malware Abuse Cryptography? Python Answers
  • Download Scripts
  • Bypassing IPS with Hand-Made XOR Encryption
  • Quick Introduction To Encryption Algorithms
  • Protecting Your Tunnel with AES
  • Protecting Your Tunnel with RSA
  • Developing One Time, Hybrid - Encryption Key
Python 3 / Windows 10 / Kali 2 : Passwords Hacking
  • Download Scripts
  • Keylogger
  • Quick note
  • Hijacking KeePass Password Manager
  • Bonus: Dumping Saved Passwords Out of Google Chrome
  • Bonus: Exercise: Dumping Saved Passwords Out of Google Chrome
  • Quick note
  • Man in the Browser Outline
  • FireFox API Hooking with ImmunityDebugger
  • Python in Firefox PoC
  • Exercise: Python in Firefox EXE
  • Passwords Phishing - DNS Poisoning
  • In Action: Facebook Password Phishing
  • Don't Skip Me! - Countermeasures
Windows 7 & 10 Privilege Escalation - Weak Service Permission
  • Download - Exercises + Scripts
  • Privilege Escalation Part 1 - Weak Service File Permission Outline
  • Privilege Escalation Part 2 - Preparing Vulnerable Software
  • Privilege Escalation Part 3 - Backdoor-ing Legitmate Windows Service
  • Privilege Escalation Part 4 - Create a New Admin account & Erasing Tracks