Home / Course catalog / Hacking the Windows API with Python - Real Ethical...

Python

Hacking the Windows API with Python - Real Ethical Hacking


Description
Welcome to the FIRST complete guide to Hacking Windows API With Python! A lot of other Python Hacking courses will just teach you how to hack or attack target systems. We teach how to actually build your own Custom Tools and start a Professional Portfolio that will boost your career!

This course not only teaching you how to use python to abuse windows but also how windows API calls actually work! This will help you in any language when looking at the windows API. While going through the course you will be exposed to how Windows really works under the hood! This will provide you much better insight on how Windows works as well as some more advanced topics.

Topics to expect:

Learning Windows APIs & How They Work

How to use Windows API Calls in Python

Windows Internal Complex Structures

Windows Access Tokens

Windows Handles

How Processes work and pass data

Crushing Processes via Token Smashing

Creating Custom Tools

Building a Professional Portfolio

Impersonating Other Users via Abused Processes

Compiling Python to Windows PE/exe

Students should have basic familiarity with Python.

These are only SOME of the topics covered in this course. Of course you will receive 24 hour support via Q/A of the course.

Don't wait! Take your career to the next level with the Full Guide on Hacking The Windows API With Python. 

Continue To Order: https://ethicalhackersacademy.com/produc...

Content
  • Introduction
  • Introduction
  • Introduction Links
  • Setting Up
  • Setting Up Your Professional Portfolio
  • Setting Up Your Professional Portfolio Links
  • Installing Python & Tools on Windows
  • Installing Python & Tools on Windows Links
  • Windows API Overview
  • Windows Internals
  • Windows Internals Links
  • The Windows API Call
  • The Windows API Call Links
  • The API Basics & Hooking Into A Windows Process
  • Hello World Windows API Style
  • Hello World Windows API Style Links
  • Gaining a Handle to a Windows Process
  • Gaining a Handle to a Windows Process Links
  • First Project - ProcKiller
  • First Project - ProcKiller - Walkthrough Part 1
  • First Project - ProcKiller - Walkthrough Part 2
  • First Project - ProcKiller - Walkthrough Links
  • More Advanced Windows API Calls
  • Windows Internal Structures
  • Spawning a Process
  • Spawning a Process Links
  • Undocumented API Calls
  • Undocumented API Calls Links
  • Abusing Windows Tokens
  • What are Token Privileges
  • What are Token Privileges Links
  • Opening a Processes Access Token
  • Opening a Processes Access Token Links
  • Checking a Processes Token Privileges
  • Checking a Processes Token Privileges Links
  • Modifying a Processes Token Privileges
  • Modifying a Processes Token Privileges Links
  • Second Project - Impersonation Tool
  • Second Project - Impersonation Tool Walkthrough
  • Second Project - Impersonation Tool Walkthrough Links
  • Compiling Python to PE/EXE
  • Compiling Python to an EXE
  • Congratulations!
  • Congratulations!
  • Certified Red Team Expert
Completion rules
  • All units must be completed
  • Leads to a certification with a duration: Forever