Genre: eLearning | MP4 | Video: h264, 1280×720 | Audio: aac, 48000 Hz
Language: English | VTT | Size: 1.53 GB | Duration: 3.5 hours
What you’ll learn
Installing Python and choosing an I.D.E. or text editor for development
Learning the basic things you need to know to understand the rest of the course
Communicating with our program using XMPP and Matrix messaging protocols and, as a fail-safe, Dropbox
Writing a low level packet sniffer
Writing a simple Keylogger
Encrypting and decrypting data using AES encryption for our communications
A spreading technique useful in organizational settings
Persistence and privilege escalation using Python
Some simple programs for downloading content, unzipping password protected files, checking for Internet connection, Steganography and self-destruction
Putting all parts together, scheduling functions and creating an updatable, standalone executable
Writing a simple ransomware
Writing a Python dropper that can help us mine cryptocurrencies
Requirements
Basic knowledge of programming and IT
macOS, Linux or Windows machine (for development), Windows machine (for testing)
Description
Welcome to this course where you’ll learn how to build a decentralized malware bot with Python that targets Windows operating systems. Python is de-facto language used by ethical hackers and learning it for you professional career can boost your chances of employment as a cyber security professional.
This course is an entry point for offensive penetration testers and won’t dive deep into any of the topics, but covers a lot of basics. This intentional lack of depth makes novice penetration testers explore this course as an inspiration, a way of thought. Contents of this course are needed for completing security certifications and can be specially of importance if you want to start learning about malware analysis and reverse engineering. This is a technical course but the emphasis is on problem solving.
This course can also be useful for system administrators and those of you who prefer a defensive approach in penetration testing, as you can see how systems can get infected, how and where malware can hide itself, what parts of Windows are affected by the infection, how important it is to patch and update the operating system, how simple user interaction may trigger a malware infection, and how not blacklisting unnecessary local and web services can lead to potentially catastrophic consequences for your organization.
Reviews
There are no reviews yet.