43, Mohamed Sakr Khafaga ST, from Abbas El-Akkad, Cairo

Trainings

Python programming

  • Python programming 1
  • Python programming 2
  • Python programming 3
  • Python programming 4
  • Python programming 5
  • Python programming 6
  • Python programming 7

Python Security

Home Lab Setup

  •  Intro.
  •  Preparing Attacker Machine - Kali linux.
  •  Preparing Target Machine - Windows 7.

Warming up - Your First Anti-Virus Free Persistence Shell

  •  TCP Reverse Shell Outline.
  •  Coding a TCP Reverse Shell.
  •  Data Exfiltration.
  •  Exporting to EXE.
  •  HTTP Reverse Shell Outline
  •  Coding HTTP Reverse Shell in 5 Lines of Python!
  •  Data Exfiltration.
  •  Exporting to EXE.
  •  Persistence Outline.
  •  Making Putty.exe Persistent.
  •  Wrap up - Making a Persistent HTTP Reverse Shell.
  •  Tuning the connection attempts
  •  Final Notes.
  •  Countermeasures

Advanced Scriptable Shell 

  • Dynamic DNS (DDNS) Outline
  •  DDNS Aware Shell
  •  Interacting with Twitter
  •  Parsing Tweet in 3 Lines!
  •  Countermeasures
  •  Replicating Metasploit "Screen Capturing"
  •  Replicating Metasploit "Searching for Content"
  •  Target Directory Navigation
  •  Integrating Low Level Port Scanner

Passwords Hacking

  • Anti-Virus Free Keylogger
  •  Hijacking KeePass Password Manager
  •  Man in the Browser Outline
  •  FireFox API Hooking with ImmunityDebugger
  •  Python in Firefox PoC
  •  Exercise: Python in Firefox EXE
  •  Bonus: Dumping Saved Passwords Out of Google Chrome
  •  Bonus: Exercise: Dumping Saved Passwords Out of Google Chrome
  •  Passwords Phishing - DNS Poisoning
  •  In Action: Facebook Password Phishing
  •  Don't Skip Me! - Countermeasures

​​​​​​​

Catch Me If You Can! 

  • Bypassing Host Based Firewall Outline
  •  Hijacking Internet Explorer - Shell Over Internet Explorer
  •  Bypassing Reputation Filtering in Next Generation Firewalls - Outline
  •  Interacting with Source Forge
  •  Interacting with Google Forms
  •  Exercise: Putting All Together - Bypassing Botnet Filtering
  •  Bypassing IPS with Hand-Made XOR Encryption

Miscellaneous Fun in Windows

  •  Privilege Escalation Part 1 - Weak Service File Permission Outline
  •  Privilege Escalation Part 2 - Preparing Vulnerable Software
  •  Privilege Escalation Part 3 - Backdoor-ing Legitimate Windows Service
  •  Privilege Escalation Part 4 - Create a New Admin account & Erasing Tracks

How Malware Abuse Cryptography? Python Answers

  •  Quick Introduction to Encryption Algorithms
  •  Protecting Your Tunnel with AES
  •  Protecting Your Tunnel with RSA
  •  Developing One Time, Hybrid - Encryption Key Preview.