YoVDO

Advanced Exploitation and Scripting Techniques

Offered By: Packt via Coursera

Tags

Ethical Hacking Courses Python Courses Network Security Courses Man in The Middle Attacks Courses Brute-Force Attacks Courses ARP Spoofing Courses Keylogger Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Advance your hacking skills with this comprehensive course focusing on sophisticated exploitation and scripting techniques. Begin with mastering Man-in-the-Middle (MITM) attacks, where you’ll explore the ARP protocol, install and troubleshoot MITMf, and perform advanced attacks like HTTP traffic sniffing and DNS spoofing. You'll also learn how to hook browsers with BEEF, clone web pages, and capture screenshots, providing a robust foundation in MITM attack methodologies. Next, the course transitions to Python basics, which is crucial for any hacker looking to automate tasks and develop custom scripts. Through detailed video lessons, you’ll gain proficiency in Python programming, covering essential topics such as variables, loops, functions, and classes. This foundational knowledge sets the stage for more advanced projects, ensuring you can effectively write and understand Python scripts tailored for hacking. The final sections focus on developing complex hacking tools. You’ll learn to create advanced backdoors capable of reverse shell connections, executing commands, and maintaining persistence. You'll also develop a keylogger to capture keystrokes and integrate it with your backdoor for enhanced functionality. The course culminates in creating a brute force attacker, teaching you to start threads, bypass antivirus software, and send malware with spoofed emails. Each module provides practical, hands-on experience, ensuring you can apply these advanced techniques in real-world scenarios. This course is designed for experienced ethical hackers and cybersecurity professionals looking to advance their exploitation and scripting skills. Prior knowledge of basic ethical hacking principles and familiarity with Python is recommended.

Syllabus

  • MITM Attacks (Man in the Middle)
    • In this module, we will delve into the intricacies of Man in the Middle (MITM) attacks. You will learn the basics of the ARP protocol, install MITMf, perform manual ARP spoofing, and execute advanced MITM techniques such as DNS spoofing, HTTPS password sniffing, and browser hooking with BEEF.
  • Python Basics
    • In this module, we will cover the foundational aspects of Python programming. You will learn about variables, input handling, control structures like if-else statements and loops, as well as functions, classes, and file operations. This knowledge will be essential for developing scripts and tools in the subsequent modules.
  • Developing an Advanced Backdoor
    • In this module, we will guide you through developing an advanced backdoor. You will learn the theory behind reverse shells, write server and client code, send and receive messages, execute commands, and add persistence. Additionally, you will learn to capture screenshots and embed the backdoor in images, ensuring a comprehensive understanding of backdoor development.
  • Developing a Keylogger
    • In this module, we will focus on developing a keylogger. You will learn to import the Pynput library, write a simple keylogger, add a reporting function, and write keystrokes to a file. Additionally, you will integrate the keylogger with your reverse shell, enhancing its capabilities for data capture.
  • Developing a Brute Force Attacker
    • In this module, we will teach you how to develop a brute force attacker. You will learn to print banners, add available options, start threads for attacks, and create functions to execute the brute force attack. Additionally, you will learn to bypass antivirus programs and send malware using spoofed emails, ensuring a robust and effective attack tool.

Taught by

Packt - Course Instructors

Related Courses

Ethical Hacking
freeCodeCamp
Cybersecurity Awareness: Malware
LinkedIn Learning
Ethical Hacking: System Hacking
LinkedIn Learning
Build Undetectable Malware Using C Language: Ethical Hacking
Udemy
Hacking Etico a PC's con Malware
Udemy