Class Details

Price: $2,195

Course Includes:

  • Class exercises in addition to training instruction
  • Courseware books, notepads, pens, highlighters and other materials
  • Full breakfast with variety of bagels, fruits, yogurt, doughnuts and juice
  • Course retake option
  • Tea, coffee, and soda available throughout the day
  • Freshly baked cookies every afternoon - *only at participating locations

This course teaches students how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker's tools, this course will teach students to create their own security defense using the Python programming language. This course demonstrates how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus. 

For group training options, call us at (240) 667-7757 or email us at

Course Outline

Setting Up Your Python Environment

  • Installing Kali Linux
  • WingIDE

The Network: Basics

  • Python networking in a paragraph
  • TCP Client
  • UDP Client
  • TCP Server
  • Replacing Netcat
  • Building a TCP Proxy
  • SSH with Paramiki
  • SSH Tunneling 

The Network: Raw Sockets and Sniffing

  • Building a UDP Host Discovery Tool
  • Packet Sniffing on Windows and Linux
  • Decoding the IP Layer
  • Decoding ICMP

Owning the Network with SCAPY

  • Stealing Email Credentials
  • ARP Cache Poisoning with SCAPY
  • PCAP Processing

Web Hackery

  • The Socket Library of the Web: urlib2
  • Mapping Open Source Web App Installations
  • Bruite-Forcing Directories and File Locations
  • Bruite-Forcing HTML form authentication

Extending Burp Proxy

  • Setting Up
  • Burp Fuzzing
  • Bing for Burp
  • Turning Website Content into Password Gold

Github Command and Control

  • Setting Up a GitHub Account
  • Creating Modules
  • Trojan Configuration
  • Building a GitHub-Aware Trojan

Common Trojaning Tasks on Windows

  • Keylogging for Fun and Keystrokes
  • Taking Screenshots
  • Pythonic Shellcode Execution
  • Sandbox Detection

Fun with Internet Explorer 

  • Main n the Browser
  • IE COM Automation for Exfiltration

Windows Privelege Escalation

  • Installing the Prerequisites
  • Create a Process Monitor
  • Windows Taken Privileges
  • Winning the Race
  • Code Injection

Automating Offensive Forensics

  • Installation
  • Profiles
  • Grabbing Password Hashes
  • Direct Code Injection


For group training options, call us at (240) 667-7757 or email