jagomart
digital resources
picture1_Hacking With Python Pdf 198153 | Pt16869~


 156x       Filetype PDF       File size 0.15 MB       Source: www.protechtraining.com


File: Hacking With Python Pdf 198153 | Pt16869~
charting the course to your success hacking with python course summary description the gray hat hacker guide to python once you ve graduated from our introduction to python scripting course ...

icon picture PDF Filetype PDF | Posted on 08 Feb 2023 | 2 years ago
Partial capture of text on file.
                      
                                                          "Charting the Course ... 
                                                                                                            ... to Your Success!" 
                      
                                                                     Hacking with Python 
                                                                                          
                                                                        Course Summary 
                      
                     Description 
                      
                     The Gray Hat Hacker Guide to Python 
                      
                     Once you've graduated from our Introduction to Python Scripting course and venture down the path of an Elite 
                     Operator, you'll find your way to our latest programming course, Hacking With Python. The Python scripting 
                     language has been on an incredible rise as we merge scripting and object oriented programming together in 
                     today's rapid development environment.  To survive as an Information Assurance analyst today, you must have 
                     a good scripting background. 
                      
                     This course teaches you how to use Python to build powerful scripts to push the limits of system security. 
                     Designed to be used for Gray Hat Hacking, the course will detail code that can be used to ethically hack into 
                     applications and networks to test security. This course is also designed with the Reverse Engineer in mind 
                     since automated Malware Analysis is almost essential in this chaotic network warfare world we live in.  Python 
                     is quickly becoming the adopted language of choice to automate analysis tasks with IDA and OllyDbg.  The 
                     world's best hackers are using Python to do their handiwork – shouldn't you? 
                      
                     On the fifth day, students will have to apply what they learned all week in a multi-level challenge.  In order to 
                     progress to the next level of the challenge they have to complete certain tasks.  First they'll have to brute force 
                     a password from an application and gain entry.  Once they gain the password they'll use that password to 
                     progress into the next challenge.  This continues four times before they can receive the final hacker prize.  This 
                     is not a trivial challenge and requires the students to fully understand what python code to write, as well as how 
                     to implement the code quickly. 
                      
                     Objectives 
                      
                     After taking this course, students will be able to: 
                            Automate tedious reversing and security tasks 
                            Design and program your own debugger 
                            Learn how to fuzz Windows drivers and create powerful fuzzers from scratch 
                            Have fun with code and library injection, soft and hard hooking techniques, and other software trickery 
                            Sniff secure traffic out of an encrypted web browser session 
                            Use PyDBG, Immunity Debugger, Sulley, IDAPython, PyEMU, and more 
                      
                     Topics 
                      
                            Python as a Hack Tool                                                  Debugger Concepts 
                            Python as a Reverse Engineering Tool                                   Intel X86 Architecture 
                            Setting up your development environment                                Scripting with PyDBG 
                            Windows Automation                                                     Scripting with Immunity Debugger 
                            Brute Forcing Console Applications                                     Scripting with IDA Pro 
                            Using the CTypes Library                                               Process Injection with Python 
                            SendKeys Module                                                        Hooking 
                            Windows GUI Automation                                                 Hard Hooking with Immunity Debugger 
                            Brute Forcing GUI Applications                                         Fuzzing 
                            Clearing Windows Event Logs                                            Py2Exe 
                            Multi - Threading in Python                                            Student Practical Demonstration: 
                            Building a Python Port Scanner 
                      Due to the nature of this material, this document refers to numerous hardware and software products by their trade names.  References to other companies and their products are for 
                     informational purposes only, and all trademarks are the properties of their respective companies.  It is not the intent of ProTech Professional Technical Services, Inc. to use any of these 
                                                                                  names generically 
                                                                                          
                      
                                                          "Charting the Course ... 
                                                                                                            ... to Your Success!" 
                      
                                                                     Hacking with Python 
                                                                                          
                                                                 Course Summary (cont’d) 
                      
                      
                     Audience 
                      
                     This course is designed for: 
                            Threat operation analysts seeking a better understanding of malware 
                            Incident responders who need to quickly address a system security breach 
                            Forensic investigators who need to identify malicious software 
                            Individuals who have experimented with malware analysis and want to expand their malware analysis 
                             techniques and methodologies 
                      
                     Prerequisites 
                      
                     Before taking this course, students should have a thorough understanding of Microsoft Windows.  Attendance 
                     of Introduction to Python or equivalent experience with Python 2.7 is required.  Knowledge of OllyDbg and 
                     IdaPro is recommended. 
                      
                     Duration 
                      
                     Five days 
                      Due to the nature of this material, this document refers to numerous hardware and software products by their trade names.  References to other companies and their products are for 
                     informational purposes only, and all trademarks are the properties of their respective companies.  It is not the intent of ProTech Professional Technical Services, Inc. to use any of these 
                                                                                  names generically 
                                                                                          
The words contained in this file might help you see if this file matches what you are looking for:

...Charting the course to your success hacking with python summary description gray hat hacker guide once you ve graduated from our introduction scripting and venture down path of an elite operator ll find way latest programming language has been on incredible rise as we merge object oriented together in today s rapid development environment survive information assurance analyst must have a good background this teaches how use build powerful scripts push limits system security designed be used for will detail code that can ethically hack into applications networks test is also reverse engineer mind since automated malware analysis almost essential chaotic network warfare world live quickly becoming adopted choice automate tasks ida ollydbg best hackers are using do their handiwork shouldn t fifth day students apply what they learned all week multi level challenge order progress next complete certain first brute force password application gain entry continues four times before receive fina...

no reviews yet
Please Login to review.