Python for Ethical Hacking

  1. System Exploitation and Post-Exploitation
    1. Shell Access and Management
      1. Shell Spawning Techniques
        1. subprocess Module Usage
          1. Shell Command Execution
            1. Interactive Shell Creation
            2. Reverse Shell Implementation
              1. TCP Reverse Shells
                1. HTTP Reverse Shells
                  1. DNS Reverse Shells
                    1. Encrypted Reverse Shells
                    2. Bind Shell Implementation
                      1. TCP Bind Shells
                        1. Multi-Client Bind Shells
                          1. Authentication Mechanisms
                        2. System Interaction and Control
                          1. Operating System Interface
                            1. Windows System Interaction
                              1. Linux System Interaction
                                1. Cross-Platform Compatibility
                                2. File System Operations
                                  1. Directory Navigation
                                    1. File Manipulation
                                      1. Permission Analysis
                                        1. Hidden File Discovery
                                        2. Process Management
                                          1. Process Enumeration
                                            1. Process Monitoring
                                              1. Process Injection Techniques
                                            2. Privilege Escalation Techniques
                                              1. Local Privilege Escalation
                                                1. Misconfiguration Exploitation
                                                  1. SUID/SGID Binary Abuse
                                                    1. Kernel Exploit Integration
                                                      1. Service Exploitation
                                                      2. Windows Privilege Escalation
                                                        1. Token Manipulation
                                                          1. Registry Analysis
                                                            1. Service Account Abuse
                                                            2. Linux Privilege Escalation
                                                              1. Sudo Misconfiguration
                                                                1. Cron Job Exploitation
                                                                  1. Capability Abuse
                                                                2. Credential Harvesting and Cracking
                                                                  1. Password Hash Extraction
                                                                    1. Windows Hash Extraction
                                                                      1. Linux Hash Extraction
                                                                        1. Application Password Storage
                                                                        2. Hash Cracking Implementation
                                                                          1. Dictionary Attacks
                                                                            1. Brute Force Attacks
                                                                              1. Rainbow Table Usage
                                                                                1. Hybrid Attacks
                                                                                2. Credential Storage and Management
                                                                                  1. Secure Credential Storage
                                                                                    1. Credential Database Management
                                                                                      1. Password Policy Analysis
                                                                                    2. Persistence and Stealth
                                                                                      1. Persistence Mechanism Implementation
                                                                                        1. Registry Persistence
                                                                                          1. Scheduled Task Persistence
                                                                                            1. Service Installation
                                                                                              1. Startup Script Modification
                                                                                              2. Stealth Techniques
                                                                                                1. Process Hiding
                                                                                                  1. File Hiding
                                                                                                    1. Network Traffic Obfuscation
                                                                                                      1. Log Evasion
                                                                                                      2. Backdoor Implementation
                                                                                                        1. Simple Backdoors
                                                                                                          1. Encrypted Backdoors
                                                                                                            1. Covert Channel Backdoors