Advance your hacking skills with this comprehensive course focusing on sophisticated exploitation and scripting techniques. Begin with mastering Man-in-the-Middle (MITM) attacks, where you’ll explore the ARP protocol, install and troubleshoot MITMf, and perform advanced attacks like HTTP traffic sniffing and DNS spoofing. You'll also learn how to hook browsers with BEEF, clone web pages, and capture screenshots, providing a robust foundation in MITM attack methodologies.
Advanced Exploitation and Scripting Techniques
This course is part of The Complete Ethical Hacking Bootcamp: Beginner To Advanced Specialization
Instructor: Packt - Course Instructors
Sponsored by Mojatu Foundation
Recommended experience
What you'll learn
Comprehend and apply Python scripts for hacking purposes.
Develop and implement advanced backdoors with persistence and command execution.
Design and integrate keyloggers with backdoors.
Construct brute force attackers and evaluate methods to bypass security measures.
Details to know
Add to your LinkedIn profile
3 assignments
September 2024
See how employees at top companies are mastering in-demand skills
Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review
There are 5 modules in this course
In this module, we will delve into the intricacies of Man in the Middle (MITM) attacks. You will learn the basics of the ARP protocol, install MITMf, perform manual ARP spoofing, and execute advanced MITM techniques such as DNS spoofing, HTTPS password sniffing, and browser hooking with BEEF.
What's included
11 videos1 reading
In this module, we will cover the foundational aspects of Python programming. You will learn about variables, input handling, control structures like if-else statements and loops, as well as functions, classes, and file operations. This knowledge will be essential for developing scripts and tools in the subsequent modules.
What's included
11 videos
In this module, we will guide you through developing an advanced backdoor. You will learn the theory behind reverse shells, write server and client code, send and receive messages, execute commands, and add persistence. Additionally, you will learn to capture screenshots and embed the backdoor in images, ensuring a comprehensive understanding of backdoor development.
What's included
21 videos1 assignment
In this module, we will focus on developing a keylogger. You will learn to import the Pynput library, write a simple keylogger, add a reporting function, and write keystrokes to a file. Additionally, you will integrate the keylogger with your reverse shell, enhancing its capabilities for data capture.
What's included
7 videos
In this module, we will teach you how to develop a brute force attacker. You will learn to print banners, add available options, start threads for attacks, and create functions to execute the brute force attack. Additionally, you will learn to bypass antivirus programs and send malware using spoofed emails, ensuring a robust and effective attack tool.
What's included
7 videos1 reading2 assignments
Instructor
Offered by
Why people choose Coursera for their career
Recommended if you're interested in Computer Science
Akamai Technologies, Inc.
Open new doors with Coursera Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy