YoVDO

Secret Pentesting Techniques - 10 Advanced Methods

Offered By: YouTube

Tags

Penetration Testing Courses Cybersecurity Courses Python Courses Network Security Courses PowerShell Courses Encryption Courses Reverse Shell Courses Shellcode Courses Binary Exploitation Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Discover cutting-edge pentesting techniques in this 41-minute conference talk. Explore advanced methods including binary droppers, shellcode execution, PowerShell injection, and PE crypters. Learn about Hyperion encryption, firewall bypassing, and egress busting. Gain insights into reverse shell usage and examine a personal favorite attack involving static AES keys. Delve into Python code examples and decrypted password analysis. Access all video content and download links for a comprehensive understanding of these secret pentesting strategies.

Syllabus

Intro
About the Speaker
Introduction
Technique #1
Explaining the Applet
Binary Dropper
Weak Sauce
Shellcodeexec
Easily detectable
PS ShellCode Injection
Method 3 - Powershell Injection
PE Crypters
Hyperion Encryption
Bumping the Firewall
Egress Busting
Egress Buster 0.2
Egress Buster Reverse Shell Usage
One of my PERSONAL Favorites
The Attack
Contents of File
Static Key for AES Anyone?
Python Code
Decrypted Password
Downloads


Related Courses

Rootkits and Stealth Apps: Creating & Revealing 2.0 HACKING
Udemy
MacOS Dylib Injection through Mach-O Binary Manipulation
Malware Unicorn via Independent
ChatGPT for Cybersecurity
HackerSploit via YouTube
Browser Exploitation - Max Zinkus
White Hat Cal Poly via YouTube
ARM Assembly and Shellcode Basics - Workshop
44CON Information Security Conference via YouTube