■ Develop custom applications for extracting data from social networks.
■ Understand how to develop customized network reconnaissance tools.
■ Learn to automate complex network and Web attacks.
■ Utilize Python to rapidly develop remote exploits.
■ Learn to evade antivirus and IDS software with ad-hoc Python Voodoo.
Today’s reality is this: No matter what business you are in, no matter where in the world you are – if you’ve got data, then your business is at constant risk. These are the words used by Robert J. McCullen to describe the current situation in the 2013 Global Security Report. IT and security professionals are faced with an increasing number of threats that are not only growing in volume, but also in sophistication and scale.
The Python for Ethical Hackers (PFEH) course provides you the tools and teach you the techniques to quickly identify and fix weaknesses in your corporate network. After a quick introduction to the Python programming language, you will learn through several hands-on exercises how to collect information about your target, launch complex Web attacks, extend world-class tools such as the Burp Suite and WinDbg, discover software vulnerabilities, write reliable exploits for Microsoft Windows, and develop custom scripts for your Android phone.
Python Essentials (Data types and variables, Operators and expressions, Conditional statements and loops, Functions and modules, Input / output, Errors and exceptions, Classes and objects, Debugging and introspection, Introduction the Python standard library, etc.)
Intelligence Gathering (Passive information gathering with Google, Metadata analysis, Extracting metadata from PDF files, Extracting metadata from Microsoft Office files, Extracting information from social networks, etc.)
Network Hacking (Network and port scanning with Nmap, Network traffic analysis, PCAP file parsing, Packet sniffing, Packet manipulation, Scapy API, etc.)
Web Hacking (HyperText Markup Language (HTML) analysis, Extending the Burp Suite in Python, Burp Extender API, HTTP traffic analysis with the Burp Suite, Building custom Web exploits from scratch, etc.)
Software Hacking (Static analysis with IDA Pro, IDAPython basics, Analyzing functions in IDAPython, Enumerating the attack surface of an application with IDAPython, Analyzing live applications with WinDbg, Scripting WinDBG with PyKd, Binary analysis with Immunity Debugger, Writing a custom PyCommand for the Immunity Debugger, Building custom exploits from scratch, Antivirus and IDS evasion, etc.)
Mobile Hacking (Android platform overview, Python for Android, Installing Python for Android, Writing Python scripts for Android, etc.)
This course is well suited for penetration testers, network administrators, security engineers, software developers, and IT professionals who are wishing to take their Python skills to the next level.
Training attendees should be familiar with the most common Web attacks (e.g. SQL Injections, Cross-Site Scripting, etc.) as well as have a basic knowledge and understanding of popular software vulnerabilities (e.g. stack buffer overflows, format strings, etc.). No prior programming experience is needed.
■ Laptop with at least forty (40) GB of free hard drive space and eight (8) GB of RAM.
■ Latest Oracle VM VirtualBox and VirtualBox Extension Pack installed.
■ A working version of Burp Suite Professional (or Burp Suite Professional Trial).
■ A working version of IDA Pro 6.8+ (for the IDAPython section).