Companies Home Search Profile

Ethical Hacking: Design Command and Control using Python 3

Focused View

Bill Reed

18:22:05

9 View
  • 1. Introduction.mp4
    05:53
  • 2. Disclaimer.mp4
    02:28
  • 3. Why use Python.mp4
    02:51
  • 1. Setup Overview.mp4
    05:07
  • 2. Installing Python 3.x.mp4
    03:20
  • 3. Installing PyCharm Community Edition.mp4
    03:02
  • 4. Installing and using Windows Subsystem for Linux.mp4
    08:41
  • 5. Amazon Web Services (AWS) Ubuntu Elastic Compute Cloud (EC2) setup.mp4
    04:26
  • 6. Installing and configuring PuTTY.mp4
    05:14
  • 7. Installing Wireshark.mp4
    03:02
  • 1.1 011-client.zip
  • 1. Begin project and client code.mp4
    13:40
  • 2.1 012-client.zip
  • 2. Obtaining request headers.mp4
    08:15
  • 3.1 013-client.zip
  • 3. Changing request headers.mp4
    10:19
  • 4.1 014-client.zip
  • 4. Adding a proxy option.mp4
    08:43
  • 5. Course Introduction, Installations, and Client Code Beginnings Quiz.html
  • 1.1 015-server.zip
  • 1. Begin server code, part 1.mp4
    13:38
  • 2.1 016-server.zip
  • 2. Begin server code, part 2.mp4
    13:02
  • 3.1 017-client.zip
  • 3.2 017-server.zip
  • 3. Changing server versions.mp4
    12:03
  • 4.1 018-client.zip
  • 4.2 018-server.zip
  • 4. Identifying Windows compromise.mp4
    20:42
  • 5.1 019-server.zip
  • 5. Override log request method.mp4
    06:11
  • 6.1 020-client.zip
  • 6. Identifying Linux compromise.mp4
    08:28
  • 7.1 021-client.zip
  • 7. Exception handling for getenv.mp4
    05:39
  • 8. Python Summary 1.mp4
    12:45
  • 9. Server Code Beginnings Quiz.html
  • 1.1 023-client.zip
  • 1.2 023-server.zip
  • 1. Begin command code.mp4
    18:52
  • 2.1 024-client.zip
  • 2. Exception handling for get.mp4
    12:37
  • 3.1 025-client.zip
  • 3.2 025-server.zip
  • 3. Sending command to client.mp4
    13:18
  • 4.1 026-client.zip
  • 4. Running command on client.mp4
    07:28
  • 5.1 027-client.zip
  • 5. Sending command output to server, part 1.mp4
    05:54
  • 6.1 028-server.zip
  • 6. Sending command output to server, part 2.mp4
    15:59
  • 7.1 029-client.zip
  • 7.2 029-server.zip
  • 7.3 029-settings.zip
  • 7. Creating a settings module and Linux test.mp4
    07:47
  • 8. Python Summary 2.mp4
    11:27
  • 9. Command Code Beginnings Quiz.html
  • 1.1 031-client.zip
  • 1. Adding change directory functionality.mp4
    12:40
  • 2.1 032-client.zip
  • 2.2 032-server.zip
  • 2.3 032-settings.zip
  • 2. Exception handling of change directory.mp4
    16:52
  • 3.1 033-client.zip
  • 3.2 033-server.zip
  • 3. Fixing incorrect prompt and blank command.mp4
    19:11
  • 4.1 034-server.zip
  • 4.2 034-temp.zip
  • 4. Fixing broken pipe and getting new active client.mp4
    19:28
  • 5.1 035-client.zip
  • 5.2 035-server.zip
  • 5.3 035-settings.zip
  • 5. Placing current working directory in prompt.mp4
    18:24
  • 6.1 036-client.zip
  • 6.2 036-server.zip
  • 6. Client kill and client sleep commands.mp4
    11:21
  • 7.1 037-client.zip
  • 7.2 037-server.zip
  • 7.3 037-settings.zip
  • 7.4 037-temp.zip
  • 7. Implementing an input timeout.mp4
    17:05
  • 8.1 038-server.zip
  • 8.2 038-settings.zip
  • 8.3 038-start5.zip
  • 8. Getting new active session at client kill command.mp4
    13:51
  • 9. Python Summary 3.mp4
    11:40
  • 10. Begin Adding Features Quiz.html
  • 1.1 040-client.zip
  • 1.2 040-server.zip
  • 1.3 040-settings.zip
  • 1.4 040-temp.zip
  • 1. Implementing symmetric encryption, part 1.mp4
    18:51
  • 2.1 041-client.zip
  • 2.2 041-encryption.zip
  • 2.3 041-server.zip
  • 2. Implementing symmetric encryption, part 2.mp4
    09:46
  • 3.1 042-client.zip
  • 3.2 042-server.zip
  • 3. Implementing symmetric encryption, part 3.mp4
    12:36
  • 4.1 043-client.zip
  • 4.2 043-server.zip
  • 4. Implementing symmetric encryption, part 4.mp4
    13:47
  • 5.1 044-client.zip
  • 5. Python summary 4 and type hinting.mp4
    10:43
  • 6. Implementing Encryption Quiz.html
  • 1.1 045-client.zip
  • 1.2 045-settings.zip
  • 1.3 045-temp.zip
  • 1. Client download file command - client code.mp4
    26:01
  • 2.1 046-client.zip
  • 2.2 046-server.zip
  • 2.3 046-temp.zip
  • 2. Client download file command - server code.mp4
    22:34
  • 3.1 047-client.zip
  • 3.2 047-server.zip
  • 3.3 047-settings.zip
  • 3. Client upload file command, part 1.mp4
    27:39
  • 4.1 048-client.zip
  • 4.2 048-server.zip
  • 4. Client upload file command, part 2.mp4
    14:27
  • 5.1 049-client.zip
  • 5.2 049-settings.zip
  • 5. Client zip file command.mp4
    13:34
  • 6.1 050-client.zip
  • 6.2 050-server.zip
  • 6. Code refactoring and fixing slash issue.mp4
    14:56
  • 7.1 051-client.zip
  • 7.2 051-temp.zip
  • 7. Client unzip file command.mp4
    05:35
  • 8.1 052-client.zip
  • 8.2 052-Code Testing.xlsx
  • 8. Testing our code.mp4
    12:58
  • 9.1 053-client.zip
  • 9.2 053-server.zip
  • 9.3 053-temp.zip
  • 9. Fixing spaces in filenames and resetting prompt.mp4
    15:33
  • 10. Python Summary 5.mp4
    12:56
  • 11. File Related Features Quiz.html
  • 1.1 055-server.zip
  • 1.2 055-temp.zip
  • 1. Implementing threading for the c2 server.mp4
    22:57
  • 2.1 056-server.zip
  • 2.2 056-temp.zip
  • 2. Server show clients command.mp4
    12:52
  • 3.1 057-server.zip
  • 3. Server control pwned id command and server exit command.mp4
    12:33
  • 4.1 058-server.zip
  • 4.2 058-settings.zip
  • 4. Server unzip filename command.mp4
    08:21
  • 5.1 059-client.zip
  • 5.2 059-server.zip
  • 5. Server zip filename command and improving exceptions.mp4
    13:53
  • 6.1 060-client.zip
  • 6.2 060-server.zip
  • 6.3 060-settings.zip
  • 6. Server list directory and server shell commands.mp4
    10:50
  • 7.1 061-server.zip
  • 7.2 061-settings.zip
  • 7. Server help command and logging.mp4
    13:56
  • 8.1 062-client.zip
  • 8.2 062-server.zip
  • 8. Respond to GET after server commands.mp4
    20:54
  • 9. Python Summary 6.mp4
    11:30
  • 10. Server Commands Quiz.html
  • 1.1 064-client.zip
  • 1. Client delay seconds command.mp4
    08:50
  • 2.1 065-client.zip
  • 2.2 065-server.zip
  • 2. Client get clipboard command.mp4
    12:45
  • 3.1 066-client.zip
  • 3. Client keylog on and client keylog off commands.mp4
    20:48
  • 4.1 067-client.zip
  • 4.2 067-server.zip
  • 4. Client type text command.mp4
    05:37
  • 5.1 068-client.zip
  • 5.2 068-server.zip
  • 5. Client screenshot command.mp4
    05:25
  • 6.1 069-client.zip
  • 6.2 069-server.zip
  • 6.3 069-temp.zip
  • 6. Client display image command and get filename bug fix.mp4
    13:49
  • 7.1 070-client.zip
  • 7.2 070-server.zip
  • 7.3 070-temp.zip
  • 7. Client flip screen and roll screen commands.mp4
    13:23
  • 8.1 071-client.zip
  • 8.2 071-server.zip
  • 8. Client max volume and client play filename commands.mp4
    12:10
  • 9.1 072-client.zip
  • 9.2 072-server.zip
  • 9. Implementing client background jobs feature.mp4
    26:12
  • 10.1 073-client.zip
  • 10. Adding more TryExcept Statements to our code.mp4
    07:22
  • 11. Python Summary 7.mp4
    15:53
  • 12. Client Commands Quiz.html
  • 1.1 075-Code Testing.xlsx
  • 1.2 075-lin client.zip
  • 1.3 075-server.zip
  • 1.4 075-win client.zip
  • 1. Separating Linux and Windows client code.mp4
    10:51
  • 2.1 076-lin cilent.zip
  • 2.2 076-server.zip
  • 2.3 076-win client.zip
  • 2. Linux to Linux test results and bug fixes.mp4
    22:04
  • 3. Shebang and other Linux details.mp4
    10:08
  • 4.1 078-Code Testing.xlsx
  • 4. How to test on your computer and final test results.mp4
    06:47
  • 5.1 079-lin client.zip
  • 5.2 079-win client.zip
  • 5. Packaging Windows client with Pyinstaller.mp4
    16:31
  • 6.1 080-gui lin client.zip
  • 6.2 080-headless lin client.zip
  • 6. Packaging Linux client with Pyinstaller.mp4
    12:42
  • 7. Packaging everything as a single folder.mp4
    05:47
  • 8. Python client code summary.mp4
    22:15
  • 9. Python server code summary.mp4
    24:05
  • 10. Finalizing Code and Testing Quiz.html
  • 1. Configuring a c2 server in the cloud.mp4
    12:02
  • 2. Malware delivery example.mp4
    10:17
  • 3. Carrying out the phishing attack.mp4
    10:46
  • 4. Ideas for improvements.mp4
    09:19
  • 5.1 final-encryption.zip
  • 5.2 final-gui lin client.zip
  • 5.3 final-headless lin client.zip
  • 5.4 final-server.zip
  • 5.5 final-settings.zip
  • 5.6 final-win client.zip
  • 5. Conclusion.mp4
    02:54
  • 1. Fix empty respository in PyCharm.mp4
    02:55
  • 2. Fix copy and paste indentation issue in PyCharm.mp4
    01:54
  • 3. Getting WSL Linux client to work with Windows c2 server.mp4
    07:29
  • Description


    Learn Python and code a c2 tool that you can use for Red Team exercises, Penetration Tests, or for educational purposes

    What You'll Learn?


    • Python coding and how to build a feature rich command and control tool that you can use for authorized cybersecurity tests, for fun, or for educational purposes
    • How to code the client and server portions of the tool and enable them to interact with each other
    • How to run the client code on target computers that do not have Python installed
    • How to build the client code for either Windows or Linux operating systems
    • How to implement AES encryption for all traffic between client and server
    • How to implement the following features in your tool: reverse shell, key logging, screen captures, clipboard stealing, turning volume up, playing audio files
    • And more features: displaying images, upload/download of files, zip/encrypt of files, unzip/decrypt of files
    • And more features: running operating system commands in the background, flipping computer's screen upside down, typing on the compromised computer
    • How to allow for multiple compromised computers to communicate to the c2 server and switch control over them
    • Numerous Python concepts and terminology; every line or block of code is explained
    • How to use Wireshark, Windows Subsystem for Linux (WSL), Ubuntu Linux, and PyCharm Community Edition Integrated Development Environment (IDE)
    • How to operate the c2 server in a cloud, and more

    Who is this for?


  • Ideally, it is for those that have some basic knowledge in at least one programming language and has an interest or experience in ethical hacking/offensive cybersecurity and would like to learn how to build their own tools. However, I start at ground zero and explain every line or block of code, thus beginners can follow along and learn too. Full source code is available within the course, which allows those that do not care about learning the Python or those that already know Python to skip most of the lessons if they prefer, but still be able to use the code.
  • What You Need to Know?


  • An Internet connection, a computer, and a willingness to learn
  • More details


    Description

         Greetings course seekers. My course, “Ethical Hacking: Design Command and Control using Python 3” is hot off the press here in 2024. The way this course works is as follows:

         I will start at ground zero and show you how to design and build a fully featured command and control tool using Python 3. I will take the time to explain to you every bit of the code that I use to make this project happen. This is a project that I accomplished myself a couple of years ago, but during my recording sessions for this class, I decided to re-do the code quite a bit, to make it better, and thus, you will get a live and realistic experience, because when bugs show up, they are new for me just as they are for you. I will record for you how I handle these situations and hopefully you can learn from this process.

         I will show you how I started the project with a very humble beginning with a small little w3schools search, but then gradually expanded the code, turning it into a fully featured command and control tool over time, including both a client and server portion with many custom commands built in and with full end to end symmetric encryption.

         I will move slowly and try to explain everything to you, including the Python code and best practices. I am not trying to rush through anything here with you. I really do want you to learn. However, if you are looking for contrived exercises to do and those sorts of things, this is not the course for that. I am showing you real code for a real Red Team tool that will have real application for you, if you work in or have an interest in Cybersecurity or Ethical Hacking.

         The way this course will progress is that we will build the tool together starting from just a couple of lines of code. During every video, I am always using the term “we” because I expect you to be following along with me every step of the way. I will also provide you with 100% of the source code after each lesson, and the final state of the code at the end of the course. My code will become your code and you can take the tool to the next level, although it will be at a prominent level already.

         The course is divided up into sections with each video building upon the last. At the end of each section, I always do a Python summary review that speaks directly to the new Python code we covered during a section of the course. Some of you that have Python experience may want to skip these videos, but for beginners or for those who are rusty, I recommend watching them.

         The entire course is just over 18 hours in length and unlike other courses that cover many different topics and speed through everything, that is not what happens here. This course covers one topic, or you might consider it to be two topics and that is it. We have the command-and-control tool itself and we have the Python code that is building the tool. That is where all my energy and time will be directed, and this allows you to focus and learn.

         My goal is that my course here will be a spark that some of you need to start building your own tools, or to make this tool even better. Learning is easy and fun when you have an interest in something, thus if you have that interest, give my course a try. If you do not care about coding your own custom tools for ethical hacking, then this course is not going to be the right fit for you.

         Enough reading already! Go watch a few of my free preview videos and see what you think.

    Who this course is for:

    • Ideally, it is for those that have some basic knowledge in at least one programming language and has an interest or experience in ethical hacking/offensive cybersecurity and would like to learn how to build their own tools. However, I start at ground zero and explain every line or block of code, thus beginners can follow along and learn too. Full source code is available within the course, which allows those that do not care about learning the Python or those that already know Python to skip most of the lessons if they prefer, but still be able to use the code.

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    I have over 30 years of experience in Network, Information, and Cybersecurity. I started my career as a Unix Administrator in a Telecommunications shop. From there, I moved to Local Area Networks and then on to Firewalls. I was one of the original members that helped form a Computer Emergency Response Team (CERT) for a US Department of Defense agency. I was also one of two to three that installed the network firewalls across that agency, positioned worldwide. I have many years of Incident Response and Computer Forensics experience. I also had a period where I was part of a Penetration Testing team and currently my job role is in Cyber Threat Emulation.I graduated with a bachelor's degree in Electronics Engineering Technology. I learned 8085 Assembly, Basic, and C language over 34 years ago and continue to utilize C to this day. Several years ago, I wrote a command-and-control program in C that used a SSH library. This was in support of a Red Team. I have also completed projects in C#, PHP, PowerShell, and of course, Python. I have extensive shell scripting experience as well. I have always enjoyed scripting and working in Linux or UNIX or working from the command line in Windows.I have maintained a few technical certifications from the SANS Institute, including GPEN (Penetration Testing), GREM (Reverse Engineering Malware), and GCIH (Incident Handling). I have also kept my EnCE (Computer Forensics) certification current and of course, my CISSP from ISC2.In terms of hobbies outside of my career, my favorite is trail running. However, I do not enjoy street or sidewalk running. I prefer being deep in the woods on technical trails. This relieves stress and hopefully keeps me in shape as I age.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 91
    • duration 18:22:05
    • English subtitles has
    • Release Date 2024/05/04