Companies Home Search Profile

Offensive Cyber Operations

Focused View

Tarek Abdelmotaleb

6:15:44

3 View
  • 1. Linux Filesystem Heirarchy.mp4
    10:17
  • 2. Linux which command.mp4
    01:54
  • 3. Linux locate command.mp4
    01:32
  • 4. Linux Netcat essentials.mp4
    07:12
  • 5. Linux find command.mp4
    01:43
  • 6. Linux grep command.mp4
    04:10
  • 7. Linux apt command.mp4
    02:50
  • 8. Linux manage services.mp4
    04:30
  • 9. Linux environment variables.mp4
    03:14
  • 10. Linux redirection and piping.mp4
    08:26
  • 11. Linux Awk and cut and manage processes.mp4
    06:59
  • 1. Bash scripting variables.mp4
    05:41
  • 2. Bash scripting read user input.mp4
    03:39
  • 3. Bash scripting if statement.mp4
    05:23
  • 4. Bash scripting for loops.mp4
    08:33
  • 5. Bash scripting while loops and reading files.mp4
    05:50
  • 1. Python data types.mp4
    08:37
  • 2. Python string manipulation.mp4
    06:49
  • 3. Python lists.mp4
    03:09
  • 4. Python loops.mp4
    08:41
  • 5. Python functions.mp4
    05:31
  • 6. Python try-except.mp4
    05:26
  • 1. Python udp socket.mp4
    07:18
  • 2. Python tcp socket.mp4
    04:34
  • 3. Python multithreaded socket.mp4
    11:08
  • 4. Python manage sessions.mp4
    11:59
  • 5. Python subprocess module.mp4
    02:41
  • 6. Python inject shellcode into a running process.mp4
    07:27
  • 7. Python LasPlagas backdoor demo.mp4
    07:13
  • 1. Python WiFi - basics.mp4
    04:21
  • 2. Python WiFi - Wireshark basics.mp4
    06:43
  • 3. Python WiFi - scan Access points with Scapy.mp4
    06:08
  • 4. Python WiFi - scan Access points with Raw Socket.mp4
    09:06
  • 5. Python WiFi - detect connected clients with raw sockets.mp4
    10:47
  • 6. Python WiFi - channel hopping.mp4
    04:58
  • 7. Python WiFi - send deauthentication frame with raw socket.mp4
    08:21
  • 1. Bettercap - SSLStrip Attack.mp4
    08:39
  • 2. Bettercap - File Replace Plugin.mp4
    04:27
  • 3. Bettercap - Beef-XSS Attack.mp4
    11:10
  • 4. ShellCloak and Beef-XSS.mp4
    09:24
  • 1. X86 Architecture Fundamentals.mp4
    06:34
  • 2. X86 Assembly - Calling function.mp4
    07:37
  • 3. X86 Assembly - stack frames.mp4
    04:57
  • 4. Buffer Overflow Part1.mp4
    14:16
  • 5. Buffer Overflow Part2.mp4
    11:53
  • 6. Buffer Overflow Part3.mp4
    11:09
  • 7. Buffer Overflow - Brute force ASLR.mp4
    12:40
  • 1. Backdooring PE - Basics.mp4
    22:27
  • 2. Backdooring PE with Code Caving.mp4
    14:22
  • 3. Backdooring PE - Encrypt and Decrypt shellcode.mp4
    13:19
  • Description


    This course teaches student to write their own pentesting tools in python and hands on binary exploitation techniques.

    What You'll Learn?


    • Python and Bash fundamentals
    • Python TCP and UDP sockets
    • Writing WiFi Pentesting tools using RAW Sockets
    • Writing Python Backdoor and manage its sessions
    • Linux Binary Socket Exploitation
    • Backdooring PE and creating a Decryption routine in Assembly

    Who is this for?


  • Cyber security students, Security developers, Security Analysts
  • What You Need to Know?


  • TCP/IP and Linux fundamentals
  • More details


    Description

    This course is 100% hands on for security developers or anyone interested in offensive security. In this course you will be able to create your own custom backdoor using python and control its sessions. You will also learn how to write Wifi pentesting tools with raw sockets. A hands on binary exploitation and backdooring PE is also covered.

    Who this course is for:

    • Cyber security students, Security developers, Security Analysts

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Tarek Abdelmotaleb
    Tarek Abdelmotaleb
    Instructor's Courses
    I have been developing security tools for four years.  I have a BS degree in Cyber Operations and currently doing my MS degree in Computer Science with Cyber Operations specialization. I was also a Defcon speaker D3FC0N 30 this year. I also have 5 years writing networking tools with C, Python, Perl, and Bash. An author of shellCloak a new AV evasion technique. I'm now shifting to exploit development and reverse engineering.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 50
    • duration 6:15:44
    • English subtitles has
    • Release Date 2024/04/13