YoVDO

Building an EmPyre with Python

Offered By: BSidesLV via YouTube

Tags

Security BSides Courses Cybersecurity Courses Phishing Courses

Course Description

Overview

Explore the development of a Python-based post-exploitation framework in this 50-minute conference talk from BSidesLV 2016. Delve into the motivations behind creating such a tool and discover its practical applications. Learn about initial phishing access techniques, including the use of Office macros, and understand the process of host triage. Witness a live demonstration showcasing domain enumeration and persistence methods for both Windows and Mac systems. Gain insights into hijacking techniques and get a glimpse of future plans for the framework. Equip yourself with knowledge about advanced post-exploitation strategies and their implementation using Python.

Syllabus

Intro
Agenda
Why build this
The solution
Initial phishing access
Fishing with the Office macro
Host triage
Demo
Domain Enumeration
Persistence
Windows
Mac
Hijacking
Future Plans


Taught by

BSidesLV

Related Courses

Network Security
Georgia Institute of Technology via Udacity
Privacy and Security in Online Social Media
Indian Institute of Technology Delhi via Swayam
The Absolute Beginners Guide to Cyber Security 2024 - Part 1
Udemy
Offensive Security Engineering
Udemy
Cyber Security Foundations: Common Malware Attacks and Defense Strategies
EC-Council via FutureLearn