Offensive Python

R11,999.00

The world of information security consists of a multitude of complex issues and techniques on how to deal with the many environments that can be vulnerable to global cyber-attacks. The groups that get stronger are not only the hackers who try to hurt you but also the defense groups in the organizations, the more known the attacks, the more definite their defense. The course offers participants advanced levels of attack to evade the many defense mechanisms available in the market today with the help of independent tools and Python programming capabilities.

Duration: 40 Hours

Target Audience

  • Ethical hackers and penetration testers
  • Students preparing for OSCP, OSCE, GPEN, GXPN, CEH
  • Information security professionals and cybersecurity consultants
  • System and network security administrators
  • Programmers who want to get their hands dirty

Pre-requisites

  • ThinkCyber Level-2 Courses

Objectives

  • Understanding the cyber threat landscapes
  • Acquiring knowledge and tools
  • Identifying attacks when accruing on the network
  • Testing networks and systems for vulnerabilities and create an attack mechanism
  • Reinforce Metasploit framework using Python
  • Becoming familiar with a variety of available tools for performing security-related tasks
Category:

Description

Module 1: Offensive Networking with Python

This module will teach the students how to use python programming language during any penetration testing or ethical hacking operation and how to use Python to automate your network analysis scripts on various information security fields.

  • Offensive Networking
    o Raw Sockets Basics
    o Socket Libraries and Functionality
    o Programming Servers and Clients
    o Writing Packet Sniffers
    o PCAP File Parsing and Analysis
    o Automating Network Attacks with Python
  • Utilizing Scapy
    o Crafting packets with Scapy
    o Routing using Scapy
    o Creating Automation with Scapy
    o Offensive Scapy Techniques
    o DDoS Attack
    o Port Scanning and Version Detection
    o Automate the Process of PCAP Parsing
    o Using Scapy to Create a Custom Wireless Data leakage tool

Module 2: Ethical Hacking with Python

This module will teach students to handle common and various ethical hacking techniques to write automation processes to that procedure.

  • Ethical Hacking
    o Privesc Enumeration Scripts
    o Python I/O Handling
  • Password Cracking
    o Wordlist Generation Tool
    o Building Password Guessing Tool
    o Password Cracking with Python
    o Automating Brute-force Attacks
    o Automate Banner Grabbing
  • Advanced Scanning with Python
    o Shodan CLI Integration
    o Automated Nmap Script
    o Advanced Shodan Search with Python
  • Web Application pen-testing automation process
    o Fuzzing
    o Requests and Response
    o Examine Directories and Files
    o Parsing HTML Files
    o URL Fetching and Parsing
    o Customizing SQL Injection Queries

Module 3: Replicate Metasploit features

Metasploit framework is written in Ruby and does not support scripts written in Python, so it requires some additional tuning to automate the actions of the attacker using Metasploit and Python together. In this module, students will learn how to automate Metasploit script using Python and other useful techniques for ethical hacking.

  • Creating Offensive Tool
    o Interact Python with Metasploit
    o Create Metasploit Scripts
    o Build a Port Scanner
    o Process Monitoring with Python
    o Cracking Tools
    o Reverse Shells
    o Extracting Images from TCP Streams
  • Mimicking Metasploit Framework
    o Auxiliary in Python
    o Understanding Reverse and Bind Shells
    o Working with Anonymity
    o Enumerating Services
    o Post Exploitation Procedures
    o Introduction to Buffer Overflow attacks
    o Pymetasploit3 – Metasploit Automation Library