Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Coursera

Advanced Exploitation and Scripting Techniques

Packt via Coursera

Overview

Advance your hacking skills with this comprehensive course focusing on sophisticated exploitation and scripting techniques. Begin with mastering Man-in-the-Middle (MITM) attacks, where you’ll explore the ARP protocol, install and troubleshoot MITMf, and perform advanced attacks like HTTP traffic sniffing and DNS spoofing. You'll also learn how to hook browsers with BEEF, clone web pages, and capture screenshots, providing a robust foundation in MITM attack methodologies. Next, the course transitions to Python basics, which is crucial for any hacker looking to automate tasks and develop custom scripts. Through detailed video lessons, you’ll gain proficiency in Python programming, covering essential topics such as variables, loops, functions, and classes. This foundational knowledge sets the stage for more advanced projects, ensuring you can effectively write and understand Python scripts tailored for hacking. The final sections focus on developing complex hacking tools. You’ll learn to create advanced backdoors capable of reverse shell connections, executing commands, and maintaining persistence. You'll also develop a keylogger to capture keystrokes and integrate it with your backdoor for enhanced functionality. The course culminates in creating a brute force attacker, teaching you to start threads, bypass antivirus software, and send malware with spoofed emails. Each module provides practical, hands-on experience, ensuring you can apply these advanced techniques in real-world scenarios. This course is designed for experienced ethical hackers and cybersecurity professionals looking to advance their exploitation and scripting skills. Prior knowledge of basic ethical hacking principles and familiarity with Python is recommended.

Syllabus

  • MITM Attacks (Man in the Middle)
    • In this module, we will delve into the intricacies of Man in the Middle (MITM) attacks. You will learn the basics of the ARP protocol, install MITMf, perform manual ARP spoofing, and execute advanced MITM techniques such as DNS spoofing, HTTPS password sniffing, and browser hooking with BEEF.
  • Python Basics
    • In this module, we will cover the foundational aspects of Python programming. You will learn about variables, input handling, control structures like if-else statements and loops, as well as functions, classes, and file operations. This knowledge will be essential for developing scripts and tools in the subsequent modules.
  • Developing an Advanced Backdoor
    • In this module, we will guide you through developing an advanced backdoor. You will learn the theory behind reverse shells, write server and client code, send and receive messages, execute commands, and add persistence. Additionally, you will learn to capture screenshots and embed the backdoor in images, ensuring a comprehensive understanding of backdoor development.
  • Developing a Keylogger
    • In this module, we will focus on developing a keylogger. You will learn to import the Pynput library, write a simple keylogger, add a reporting function, and write keystrokes to a file. Additionally, you will integrate the keylogger with your reverse shell, enhancing its capabilities for data capture.
  • Developing a Brute Force Attacker
    • In this module, we will teach you how to develop a brute force attacker. You will learn to print banners, add available options, start threads for attacks, and create functions to execute the brute force attack. Additionally, you will learn to bypass antivirus programs and send malware using spoofed emails, ensuring a robust and effective attack tool.

Taught by

Packt - Course Instructors

Reviews

Start your review of Advanced Exploitation and Scripting Techniques

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.