YoVDO

Secret Pentesting Techniques - 10 Advanced Methods

Offered By: YouTube

Tags

Penetration Testing Courses Cybersecurity Courses Python Courses Network Security Courses PowerShell Courses Encryption Courses Reverse Shell Courses Shellcode Courses Binary Exploitation Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Discover cutting-edge pentesting techniques in this 41-minute conference talk. Explore advanced methods including binary droppers, shellcode execution, PowerShell injection, and PE crypters. Learn about Hyperion encryption, firewall bypassing, and egress busting. Gain insights into reverse shell usage and examine a personal favorite attack involving static AES keys. Delve into Python code examples and decrypted password analysis. Access all video content and download links for a comprehensive understanding of these secret pentesting strategies.

Syllabus

Intro
About the Speaker
Introduction
Technique #1
Explaining the Applet
Binary Dropper
Weak Sauce
Shellcodeexec
Easily detectable
PS ShellCode Injection
Method 3 - Powershell Injection
PE Crypters
Hyperion Encryption
Bumping the Firewall
Egress Busting
Egress Buster 0.2
Egress Buster Reverse Shell Usage
One of my PERSONAL Favorites
The Attack
Contents of File
Static Key for AES Anyone?
Python Code
Decrypted Password
Downloads


Related Courses

Certified Ethical Hacker (CEH) - Linux Academy's Prep Course
A Cloud Guru
CompTIA PenTest+ Certification
A Cloud Guru
CompTIA Security+ Certification Prep
A Cloud Guru
Advanced Cyber Security Training
EC-Council via FutureLearn
Advanced Python Scripting for Cybersecurity
Infosec via Coursera