Black Hat Python For
Pentesters And Hackers
Need automated testing tools? This is the right time to switch to Python. Packed with many reverse engineering and exploitation libraries, Python is a great language to learn if you want a secure execution of all your information security tasks.
This Course Will Help You To
|Write python code to intercept and analyse network traffic.|
|Data-mine popular social media websites and evade modern anti-virus|
|Write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts|
Who is it for?
Pentesters, security enthusiasts and network administrators who want to automate tasks in Python. Basic knowledge of Python is assumed.
Each chapter of the course will start with an overview and some references which you can use to explore further on some subjects. It will then be followed by hands on demonstration which you can replicate within a lab environment which we will help you to build
About the Course
Black Hat Python for Penetration Testers and Hackers
Starting from scratch this course will enable you to all the latest tools and techniques available for Python penetration testing.
This course will teach you how to read and write new packets, sniff the network and will equip you with everything or anything you need to audit and attack web applications. Later you will dive deeper into writing code to address the specifics with attacking Windows systems.
By the end of the course you will successfully able to use to Python scripts for penetration testing on a variety of system.
Click on the link below to download the code files and get started
Watch Your First Video
- Overview of Python Penetration Testing
- Setting up Python environment: Installation and configuring virtual environments
- String formatting in Python 3
- Python Data Structures: Dictionaries, lists, tuples, and sets
- Python networking: File I/O handling and data serialization
- Object-Oriented Programming in Python
- Port scanning principles
- Making a port scanner
- Banner grabbing
- Importing and using nmap
- Target research and reconnaissance
- Web page scraping
- Phishing: Going from Recon to creds
- Password Cracking Concepts
- Pre-computed wordlists
- Brute force with threads
- Rainbow tables
- Cracking Linux hashes
- Cracking ZIP files
- Python Ctypes
- Evading anti-virus checking
- Dropping the payload
- Overview of Forensics Investigation
- Parsing Windows registry
- Examining metadata
- Investigating application artifacts
- Using SQLAlchemy to work with SQL databases
- Investigating Firefox profile databases
Know Your Author
Cody Jackson is a differently military veteran, the founder of Socius Consulting, an IT and business management consulting company in San Antonio, Texas.
He is a self-taught Python programmer and is the author of Learning to Program Using Python and Secret Recipes of the Python Ninja.
He holds an Associate in Science degree in electromechanical technology, a Bachelor of Science degree in computer engineering technology, and a Master of Science degree in IT management, as well as numerous IT certifications including CEH