Command and Control with Pupy
Offered By: Pluralsight
Course Description
Overview
Learn how to use the Pupy server to connect to exploited clients over different encryption protocols and use these sessions to run additional attacks, dump credentials, and collect information.
Are you looking for a tool that can help you manage your target workstations after you exploited them? In this course, Command and Control with Pupy, you will gain the ability to manage target sessions, collect information, and run additional attacks from a single interface. First, you will learn how to generate client files in Pupy. Next, you will discover how to use different encryption protocols in Pupy. Finally, you will explore how to capture information from targets using Pupy. When you are finished with this course, you will have the skills and knowledge needed to manage exploited targets with Pupy.
Are you looking for a tool that can help you manage your target workstations after you exploited them? In this course, Command and Control with Pupy, you will gain the ability to manage target sessions, collect information, and run additional attacks from a single interface. First, you will learn how to generate client files in Pupy. Next, you will discover how to use different encryption protocols in Pupy. Finally, you will explore how to capture information from targets using Pupy. When you are finished with this course, you will have the skills and knowledge needed to manage exploited targets with Pupy.
Taught by
Matt Glass
Related Courses
Design Computing: 3D Modeling in Rhinoceros with Python/RhinoscriptUniversity of Michigan via Coursera A Practical Introduction to Test-Driven Development
LearnQuest via Coursera FinTech for Finance and Business Leaders
ACCA via edX Access Bioinformatics Databases with Biopython
Coursera Project Network via Coursera Accounting Data Analytics
University of Illinois at Urbana-Champaign via Coursera